VYPR
Critical severityGHSA Advisory· Published May 20, 2026· Updated May 20, 2026

Supply chain compromise via malicious package versions (@cap-js/sqlite, @cap-js/postgres, @cap-js/db-service)

CVE-2026-46421

Description

Impact

On April 29, 2026, compromised versions of @cap-js/sqlite@2.2.2, @cap-js/postgres@2.2.2, and @cap-js/db-service@2.10.1 were published. The malicious packages harvested credentials and attempted self-propagation. If a compromised version was installed, all credentials accessible on that machine (npm tokens, cloud provider credentials, SSH keys, GitHub PATs) should be considered compromised.

Patches

Upgrade to @cap-js/sqlite >= 2.4.0, @cap-js/postgres >= 2.3.0, @cap-js/db-service >= 2.11.0. If a compromised version was ever installed, rotate all affected credentials.

Workarounds

No workarounds.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Malicious versions of SAP CAP npm packages steal credentials and self-propagate; all credentials on an infected machine are compromised.

Vulnerability

On April 29, 2026, compromised versions of @cap-js/sqlite@2.2.2, @cap-js/postgres@2.2.2, and @cap-js/db-service@2.10.1 were published to npm [1][2]. These packages are core components of SAP's Cloud Application Programming (CAP) model development toolchain. The malicious code is delivered via a preinstall hook that bootstraps the Bun JavaScript runtime and executes an obfuscated credential stealer [1].

Exploitation

An attacker needs no special privileges beyond the ability to publish compromised packages to npm, which they obtained by stealing an npm token from a previous infection [1]. Once a developer or CI pipeline installs a compromised package, the malware harvests credentials and attempts self-propagation by using the stolen npm token to publish malicious versions to other packages that token can access [1]. The payload also persists by writing .claude/settings.json and .vscode/tasks.json files that trigger re-execution when the repository is opened in AI coding tools or Visual Studio Code [1].

Impact

All credentials accessible on the infected machine are exfiltrated, including npm tokens, cloud provider credentials, SSH keys, and GitHub personal access tokens [1][2]. Stolen credentials are used to create public GitHub repositories branded “A Mini Shai-Hulud has Appeared,” and the worm propagates to other packages the victim's token can reach [1]. This supply chain attack compromises developer machines and potentially affects downstream users of the CAP toolchain.

Mitigation

Upgrade to @cap-js/sqlite >= 2.4.0, @cap-js/postgres >= 2.3.0, and @cap-js/db-service >= 2.11.0 immediately [2]. If a compromised version was ever installed, rotate all credentials (npm tokens, cloud provider credentials, SSH keys, GitHub PATs) that were accessible on that machine [1][2]. No workarounds are available [2].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

4

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.