CVE-2026-22663
prompts · prompts (npm package)
The "prompts" library, a popular Node.js package for interactive CLI prompts, contains a vulnerability that could lead to improper input handling.
Executive summary
A high-severity vulnerability in the "prompts" npm package could allow attackers to manipulate command-line interactions or compromise the integrity of CLI tools.
Vulnerability
The vulnerability is located within the "prompts" library, used to create interactive command-line interfaces. An attacker could potentially provide malicious input that bypasses local sanitization, leading to code execution or information disclosure in the context of the CLI application.
Business impact
CLI tools are often used by developers and administrators with elevated privileges. A vulnerability in a foundational library like "prompts" could lead to the compromise of developer workstations or CI/CD pipelines. The CVSS score of 7.5 indicates a high risk to the software supply chain.
Remediation
Immediate Action: Update the "prompts" package in your package.json to the latest secured version and rebuild your applications.
Proactive Monitoring: Use software composition analysis (SCA) tools to identify all projects using vulnerable versions of the "prompts" library.
Compensating Controls: Implement strict input validation within your own code that uses the library to ensure that no malicious characters are passed to the prompts.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The high CVSS score of 7.5 makes this a critical update for any Node.js development environment. Ensure that all internal and external CLI tools utilizing the "prompts" library are patched to the latest version immediately to maintain supply chain security.