Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.mvnpm/posthog-node
  4. ›
  5. GMS-2025-800

GMS-2025-800: posthog-node compromised with credential-harvesting malware

November 27, 2025

On November 25th 2025, the Shai-Hulud 2.0 supply chain attack spread to Maven Central through automated mirroring of compromised npm packages. The org.mvnpm:posthog-node:4.18.1 package contains malicious code that attempts to harvest credentials and infect GitHub repositories. The malware was automatically mirrored from the compromised npm version via the mvnpm process that rebuilds npm packages as Maven artifacts. The malicious software executes during the build phase and attempts to harvest credentials from popular online services. It is recommended all credentials be rotated, Maven cache is cleared, target directories are removed and all dependencies be rolled back to previous versions.

References

  • about.gitlab.com/blog/gitlab-discovers-widespread-npm-supply-chain-attack/
  • socket.dev/blog/shai-hulud-strikes-again-v2
  • thehackernews.com/2025/11/shai-hulud-v2-campaign-spreads-from-npm.html
  • www.wiz.io/blog/shai-hulud-2-0-ongoing-supply-chain-attack

Code Behaviors & Features

Detect and mitigate GMS-2025-800 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

Version 4.18.1

Solution

Unfortunately, there is no solution yet.

Impact 8.6 HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-506: Embedded Malicious Code

Source file

maven/org.mvnpm/posthog-node/GMS-2025-800.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sun, 14 Dec 2025 00:19:18 +0000.