VYPR

npm · Malicious package advisory

Malware

art-template

MAL-2026-4200

Malicious code in art-template (npm)

Details

Versions 4.13.3, 4.13.5, and 4.13.6 of `art-template` were published after an npm account takeover and ship a tampered browser bundle (`lib/template-web.js`) that loads remote attacker-controlled JavaScript. The final payload is the Coruna iOS exploit kit, which targets Safari on iPhone and iPad and drops the PLASMAGRID cryptocurrency-wallet stealer. The last clean release is 4.13.2. Server-side Node.js usage is not directly affected; the malicious code only runs when the modified browser bundle is loaded into a victim page.

See the linked SafeDep report for the full account-takeover timeline, payload analysis, and indicators of compromise.

---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (b01c0c8249326d15f606a8a8843d7930b1cdc4036130f4669b36b615330b3c73)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

Compromised versions (3)

  • 4.13.3
  • 4.13.5
  • 4.13.6

Any computer that installed or ran a compromised version should be considered fully compromised. Rotate every secret on that machine from a clean environment.