
We found results for “”
MSC-2025-7950
Good to know:


Date: September 9, 2025
prebid.js was compromised to include malicious code that targets browser-based web3 environments. The injected payload intercepts Ethereum and Solana wallet interactions, redirecting funds and approvals to attacker-controlled addresses. The compromise occurred after a maintainer’s account was accessed via phishing. We recommend removing the affected version from the codebase and upgrade to the latests clean version 10.10.0
Severity Score
Related Resources (1)
Severity Score
Top Fix

Upgrade Version
Upgrade to version prebid.js - null
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | LOW |
Integrity (I): | NONE |
Availability (A): | NONE |