critical

CVE

CVE-2026-25244, CVE-2026-45321, CVE-2026-27886, CVE-2026-22599, CVE-2026-22707, CVE-2026-22706, CVE-2025-64526, CVE-2026-46300, CVE-2026-43284, CVE-2026-43500, CVE-2026-41242

CWE

CWE-506, CWE-78, CWE-123, CWE-89, CWE-94, CWE-200, CWE-307, CWE-434, CWE-693, CWE-943

Affected Surface

durabletask 1.4.1 through 1.4.3, nrwl.angular-console 18.95.0, @wdio/browserstack-service <= 9.23.2, github.com/shopsprint/decimal 1.3.3, npm packages, PyPI packages, NuGet packages, RubyGems registry workflows, GitHub Releases, Strapi CMS, Linux kernel, protobufjs

Welcome to Corgea’s weekly briefing. The briefing covers the most important security findings and research from the week.

This edition covers research published from Tuesday, 12 May through Tuesday, 19 May 2026, with a focus on the supply-chain, kernel, and application-security issues that materially change response priorities.

Top Article

durabletask PyPI releases backdoored with multi-cloud credential stealer

The most important late-breaking story is the May 19 PyPI compromise of Microsoft’s durabletask Python SDK. Malicious versions 1.4.1, 1.4.2, and 1.4.3 added import-time Linux droppers that fetched rope.pyz, harvested AWS, Azure, GCP, Kubernetes, Vault, Docker, SSH, package-registry, password-manager, and AI-tool credentials, and attempted lateral movement through AWS SSM and Kubernetes kubectl exec.

Public reporting from Aikido, Endor Labs, SafeDep, Kamil Mankowski’s bad-packages catalog, and Cyber Kendra shows a familiar but worsening TeamPCP pattern: trusted package artifacts, cloud-native secret collectors, encrypted exfiltration, GitHub dead drops, and worm behavior. Treat any Linux host that imported an affected durabletask version as compromised and rotate credentials from a known-clean machine.

More news

Mini Shai-Hulud npm worm hits AntV, echarts-for-react, and timeago.js

The May 19 Mini Shai-Hulud expansion into the AntV ecosystem and related npm packages remains the largest npm story of the week. The wave affected packages including echarts-for-react, timeago.js, size-sensor, jest-canvas-mock, and hundreds of @antv/* packages. This was not a typosquat: malicious releases were published through accounts with legitimate npm publish access, so projects using broad semver ranges could resolve to poisoned versions during clean installs.

Public reporting from Socket, Aikido, SafeDep, StepSecurity, OpenSource Malware, and package-advisory data shows a familiar pattern from the same TeamPCP supply-chain campaign covered in our TanStack analysis and Cemu release-asset compromise. The payload used install-time execution, GitHub dependency hooks, credential theft, GitHub API dead drops, and package-republishing logic to spread. Treat any developer workstation or CI runner that installed the affected versions as potentially compromised, not just as a dependency-inventory finding.

Mini Shai-Hulud Supply-Chain Worm Compromises TanStack, Mistral AI, UiPath, and 160+ npm Packages

TeamPCP’s May 11 wave remains one of the clearest examples of why package provenance is not a complete safety signal. Wiz, Socket, Aikido, TanStack, and Endor Labs documented how the TanStack compromise chained a privileged pull_request_target workflow, GitHub Actions cache poisoning, and OIDC token theft from runner process memory to publish malicious npm packages with valid trusted-publisher provenance. TanStack later tracked its portion as CVE-2026-45321.

The operational takeaway is urgent for teams that rely on GitHub Actions publishing: restrict OIDC permissions, review cache boundaries, pin third-party actions, and search for the Mini Shai-Hulud persistence paths in .claude, .vscode, and GitHub Actions workflows. This same campaign context helps explain why the AntV npm wave and Cemu GitHub Releases compromise matter beyond their individual package lists.

Strapi advisory cluster exposes admin token oracle and content-builder SQL injection

Strapi’s mid-May advisory cluster gives application teams a different kind of critical risk: production CMS request paths that can expose admin reset-token material, database-query injection, upload-policy bypasses, session-retention bugs, and rate-limit bypasses. Strapi’s advisories and the follow-on NVD records credit the project with publishing the fixes and affected package ranges for CVE-2026-27886, CVE-2026-22599, CVE-2026-22707, CVE-2026-22706, and CVE-2025-64526.

The highest-risk issue is CVE-2026-27886, where public Content API filtering could act as a boolean oracle against restricted admin-user fields such as reset-password tokens. Teams running Strapi should upgrade, review logs for relational-filter probing, revoke admin and users-permissions sessions, and remove unexpected uploaded active content.

Other news: