CVE-2025-10894

Nx · Nx build system and related plugins

A critical software supply-chain vulnerability has been identified in the Nx build system, where malicious code was injected into official packages and published to the npm registry.

Executive summary

A critical software supply-chain vulnerability has been identified in the Nx build system, where malicious code was injected into official packages and published to the npm registry. This allows attackers to execute arbitrary code within an organization's development and build environments, potentially leading to the theft of sensitive data, intellectual property, and the compromise of software artifacts being built.

Vulnerability

This vulnerability is a software supply-chain attack. An unauthorized actor successfully published tampered versions of the Nx package and several associated plugins to the public npm software registry. The injected malicious code is designed to execute automatically during the software build process (e.g., during dependency installation or when running a build command). An attacker does not need any prior access to the target environment; exploitation occurs when a developer or an automated CI/CD pipeline downloads and uses the compromised package, leading to arbitrary code execution on the build machine.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.6. Successful exploitation could lead to a complete compromise of the organization's software development lifecycle and CI/CD pipelines. The potential consequences include theft of source code, exposure of sensitive credentials (API keys, database passwords, private keys) stored in the build environment, and the ability for an attacker to inject further malware or backdoors into the company's own software products. This could result in significant financial loss, reputational damage, and a secondary supply-chain attack targeting the organization's customers.

Remediation

Immediate Action: Immediately update all instances of the Nx build system and related plugins to the latest patched version as specified by the vendor. Audit all CI/CD pipelines and developer environments that used the affected versions to identify any signs of compromise. It is critical to rotate all secrets, API keys, and credentials that may have been exposed in these environments.

Proactive Monitoring: Monitor build server logs for anomalous activity, such as unexpected outbound network connections to unknown IP addresses, suspicious processes being spawned during a build job, or unusual file modifications. Analyze network traffic originating from build environments for signs of data exfiltration or command-and-control (C2) communication.

Compensating Controls: If immediate patching is not feasible, isolate build environments from the corporate network and restrict their outbound internet access to only essential, trusted repositories. Implement the principle of least privilege for build jobs, ensuring they do not have access to production secrets. Enforce the use of package lockfiles (package-lock.json, yarn.lock) to prevent the unintentional installation of compromised package versions.

Exploitation status

Public Exploit Available: true

Analyst recommendation

Given the critical severity (CVSS 9.6) and the nature of this active supply-chain attack, immediate action is required. Organizations must prioritize updating all affected Nx packages immediately and conduct a thorough investigation of all development and CI/CD environments for evidence of compromise. While this vulnerability is not yet on the CISA KEV list, its high impact and confirmed exploitation in the wild make it an extremely high-priority threat that must be addressed without delay.