Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @emilgroup/document-uploader
  4. ›
  5. GMS-2026-22

GMS-2026-22: Embedded Malicious Code (CanisterWorm)

March 21, 2026 (updated March 22, 2026)

This package version was compromised as part of the CanisterWorm supply chain attack, which originated from the Trivy security scanner compromise by threat actor TeamPCP on March 19, 2026. The malicious code deploys a persistent backdoor via systemd, exfiltrates npm tokens and credentials, and uses an Internet Computer Protocol (ICP) canister as a dead-drop C2 server. Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.

References

  • github.com/aquasecurity/trivy/security/advisories/GHSA-69fq-xp46-6x23
  • socket.dev/blog/canisterworm-npm-publisher-compromise-deploys-backdoor-across-29-packages
  • thehackernews.com/2026/03/trivy-supply-chain-attack-triggers-self.html

Code Behaviors & Features

Detect and mitigate GMS-2026-22 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

Version(s) 0.0.11, 0.0.12

Solution

Remove this package immediately and rotate any secrets that may have been compromised.

Weakness

  • CWE-506: Embedded Malicious Code

Source file

npm/@emilgroup/document-uploader/GMS-2026-22.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Mon, 23 Mar 2026 12:19:07 +0000.