CVE-2021-43616

Summary

CVECVE-2021-43616
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2021-11-13 18:15:00 UTC
Updated2023-11-07 03:39:00 UTC
Description** DISPUTED ** The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json. NOTE: The npm team believes this is not a vulnerability. It would require someone to socially engineer package.json which has different dependencies than package-lock.json. That user would have to have file system or write access to change dependencies. The npm team states preventing malicious actors from socially engineering or gaining file system access is outside the scope of the npm CLI.

Risk And Classification

Problem Types: CWE-345

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Fedoraproject Fedora 35 All All All
Application Netapp Next Generation Application Programming Interface - All All All
Application Npmjs Npm All All All All
Application Npmjs Npm All All All All

References

ReferenceSourceLinkTags
npm-ci | npm Docs MISC docs.npmjs.com
[SECURITY] Fedora 35 Update: nodejs-16.14.0-2.fc35 - package-announce - Fedora Mailing-Lists lists.fedoraproject.org
Our dependencies are under attack, and this time we were lucky… | by Rotem Bar | Cider Security | Nov, 2021 | Medium MISC medium.com
npm-ci | npm Docs MISC docs.npmjs.com
fix(ci): lock file validation · npm/cli@457e0ae · GitHub CONFIRM github.com
CVE-2021-43616 NPM Vulnerability in NetApp Products | NetApp Product Security CONFIRM security.netapp.com
[BUG] `npm ci` succeeds when `package-lock.json` doesn't match `package.json` · Issue #2701 · npm/cli · GitHub MISC github.com
[BUG] `npm ci` succeeds when `package-lock.json` doesn't match `package.json` · Issue #2701 · npm/cli · GitHub MISC github.com
[BUG] `npm ci` succeeds when `package-lock.json` doesn't match `package.json` · Issue #2701 · npm/cli · GitHub MISC github.com
GitHub - icatalina/CVE-2021-43616: Repo demonstrating CVE-2021-43616 / https://github.com/npm/cli/issues/2701 MISC github.com
[SECURITY] Fedora 35 Update: nodejs-16.14.0-2.fc35 - package-announce - Fedora Mailing-Lists FEDORA lists.fedoraproject.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 159868 Oracle Enterprise Linux Security Update for nodejs:16 (ELSA-2022-4796)
  • 184890 Debian Security Update for npm (CVE-2021-43616)
  • 240388 Red Hat Update for nodejs:16 (RHSA-2022:4796)
  • 282410 Fedora Security Update for nodejs (FEDORA-2022-97b214b298)
  • 354342 Amazon Linux Security Advisory for nodejs : ALAS2022-2022-214
  • 354446 Amazon Linux Security Advisory for nodejs : ALAS2022-2022-048
  • 354537 Amazon Linux Security Advisory for nodejs : ALAS-2022-214
  • 355273 Amazon Linux Security Advisory for nodejs : ALAS2023-2023-084
  • 376100 NPM Security Update - DO NOT RELEASE
  • 502318 Alpine Linux Security Update for npm
  • 505118 Alpine Linux Security Update for npm
  • 940583 AlmaLinux Security Update for nodejs:16 (ALSA-2022:4796)
  • 960250 Rocky Linux Security Update for nodejs:16 (RLSA-2022:4796)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report