CVE-2025-54313
eslint-config-prettier 8.10.1, 9.1.1, 10.1.6, and 10.1.7 has embedded malicious code for a supply chain compromise. Installing an affected package executes an install.js file that launches the node-gyp.dll malware on Windows.
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
CISA has confirmed exploitation of this vulnerability. Federal agencies must patch within the KEV deadline. SMBs should treat this as P0: patch or mitigate within 24–48 hours.
This vulnerability can be exploited remotely without credentials or user interaction. Until patched: block access to the affected service from the internet using firewall rules or ACLs. Only allow access from trusted IPs.
Apply the patch from this month's Microsoft Patch Tuesday via Windows Update. For managed environments, push via WSUS or Microsoft Endpoint Manager. Prioritise servers and domain controllers over workstations.
Log in to wp-admin → Dashboard → Updates. Update WordPress core first, then all plugins and themes. If a specific plugin is named in the CVE, update or deactivate it immediately. Consider a WAF (Cloudflare, Wordfence) as an additional layer.
SMB Attack Probability Score weights: EPSS exploit likelihood (35%), CISA KEV active exploitation (25%), SMB stack prevalence (20%), exploit maturity (10%), CVSS network vector complexity (10%). Impact scenarios are derived from software category and historical SMB incident patterns. Scores recompute daily.