GHSA-pvw4-cvr4-97p8Critical

Supply chain compromise via malicious package versions (@cap-js/sqlite, @cap-js/postgres, @cap-js/db-service)

Published
May 20, 2026
Last Modified
May 20, 2026

🔗 CVE IDs covered (1)

📋 Description

## Impact On April 29, 2026, compromised versions of `@cap-js/sqlite@2.2.2`, `@cap-js/postgres@2.2.2`, and `@cap-js/db-service@2.10.1` were published. The malicious packages harvested credentials and attempted self-propagation. If a compromised version was installed, all credentials accessible on that machine (npm tokens, cloud provider credentials, SSH keys, GitHub PATs) should be considered compromised. ## Patches Upgrade to `@cap-js/sqlite` >= 2.4.0, `@cap-js/postgres` >= 2.3.0, `@cap-js/db-service` >= 2.11.0. If a compromised version was ever installed, rotate all affected credentials. ## Workarounds No workarounds.

🎯 Affected products3

  • npm/@cap-js/sqlite:= 2.2.2
  • npm/@cap-js/postgres:= 2.2.2
  • npm/@cap-js/db-service:= 2.10.1

🔗 References (5)