Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

tanstack\/react-start-client

Source -

NVD

CNA CVEs -

0

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

1
Related CVEsRelated VendorsRelated AssignersReports
1Vulnerabilities found

CVE-2026-45321
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-9.6||CRITICAL
EPSS-0.04% / 11.91%
||
7 Day CHG~0.00%
Published-12 May, 2026 | 00:12
Updated-14 May, 2026 | 17:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Malware in 42 @tanstack/* packages exfiltrates cloud credentials, GitHub tokens, and SSH keys

On 2026-05-11, between approximately 19:20 and 19:26 UTC, 84 malicious versions across 42 @tanstack/* packages were published to the npm registry. The publishes were authenticated via the legitimate GitHub Actions OIDC trusted-publisher binding for TanStack/router, but the publish workflow itself was not modified. The attacker chained three known vulnerability classes — a pull_request_target "Pwn Request" misconfiguration, GitHub Actions cache poisoning across the fork↔base trust boundary, and runtime memory extraction of the OIDC token from the Actions runner process — to publish credential-stealing malware under a trusted identity. Each affected package received exactly two malicious versions, published a few minutes apart.

Action-Not Available
Vendor-tanstack@tanstack
Product-tanstack\/react-start-clienttanstack\/router-coretanstack\/react-router-devtoolstanstack\/solid-start-servertanstack\/start-client-coretanstack\/router-utilstanstack\/router-vite-plugintanstack\/router-generatortanstack\/router-plugintanstack\/react-router-ssr-querytanstack\/arktype-adaptertanstack\/router-ssr-query-coretanstack\/router-clitanstack\/solid-router-devtoolstanstack\/eslint-plugin-routertanstack\/vue-router-devtoolstanstack\/zod-adaptertanstack\/router-devtoolstanstack\/eslint-plugin-starttanstack\/react-start-servertanstack\/vue-start-clienttanstack\/start-server-coretanstack\/start-static-server-functionstanstack\/vue-starttanstack\/solid-starttanstack\/react-routertanstack\/solid-router-ssr-querytanstack\/nitro-v2-vite-plugintanstack\/react-starttanstack\/solid-start-clienttanstack\/start-fn-stubstanstack\/start-storage-contexttanstack\/vue-router-ssr-querytanstack\/router-devtools-coretanstack\/solid-routertanstack\/vue-routertanstack\/vue-start-servertanstack\/react-start-rsctanstack\/historytanstack\/virtual-file-routestanstack\/start-plugin-coretanstack\/valibot-adaptereslint-plugin-startvue-start-serverreact-start-clientsolid-start-clientnitro-v2-vite-pluginstart-fn-stubsrouter-ssr-query-corerouter-corestart-plugin-corestart-storage-contextvirtual-file-routessolid-router-ssr-queryrouter-devtools-corereact-start-rscrouter-utilsreact-routerrouter-generatorouter-vite-pluginrouter-devtoolshistoryreact-router-devtoolssolid-routervue-router-ssr-queryeslint-plugin-routerzod-adaptersolid-startstart-server-corevue-router-devtoolsvue-routervue-startrouter-cliarktype-adapterstart-client-corevalibot-adapterstart-static-server-functionsreact-router-ssr-queryrouter-pluginreact-start-servervue-start-clientsolid-router-devtoolsreact-startsolid-start-server
CWE ID-CWE-506
Embedded Malicious Code