Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign
Overview
The Bitwarden CLI tool has been compromised as part of an ongoing supply chain attack linked to Checkmarx, as reported by security researchers from JFrog and Socket. The malicious code was found in the package version @bitwarden/cli@2026.4.0, specifically within a file named 'bw1.js.' This incident raises concerns for users of the Bitwarden CLI, as the compromised package could potentially allow attackers to execute harmful actions via the tool. Organizations and individuals using this version should take immediate action to protect their data. The incident underscores the risks associated with supply chain vulnerabilities, which can affect a wide range of software users and developers.
Key Takeaways
- Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
- Affected Systems: @bitwarden/cli@2026.4.0
- Action Required: Users should update to a secure version of Bitwarden CLI immediately to prevent potential exploitation.
- Timeline: Newly disclosed
Original Article Summary
Bitwarden CLI has been compromised as part of the newly discovered and ongoing Checkmarx supply chain campaign, according to new findings from JFrog and Socket. "The affected package version appears to be @bitwarden/cli@2026.4.0, and the malicious code was published in 'bw1.js,' a file included in the package contents," the application security company said. "The attack appears to have leveraged
Impact
@bitwarden/cli@2026.4.0
Exploitation Status
This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.
Timeline
Newly disclosed
Remediation
Users should update to a secure version of Bitwarden CLI immediately to prevent potential exploitation.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to Malware.