The Ripple cryptocurrency npm JavaScript library named xrpl.js has been compromised by unknown risk actors as a part of a software program provide chain assault designed to reap and exfiltrate customers’ personal keys.
The malicious exercise has been discovered to have an effect on 5 completely different variations of the bundle: 4.2.1, 4.2.2, 4.2.3, 4.2.4, and a pair of.14.2. The problem has been addressed in variations 4.2.5 and a pair of.14.3.
xrpl.js is a well-liked JavaScript API for interacting with the XRP Ledger blockchain, additionally known as the Ripple Protocol, a cryptocurrency platform launched by Ripple Labs in 2012. The bundle has been downloaded over 2.9 million occasions to this point, attracting greater than 135,000 weekly downloads.
“The official XPRL (Ripple) NPM bundle was compromised by refined attackers who put in a backdoor to steal cryptocurrency personal keys and acquire entry to cryptocurrency wallets,” Aikido Safety’s Charlie Eriksen mentioned.
The malicious code modifications have been discovered to be launched by a person named “mukulljangid” beginning April 21, 2025, with the risk actors introducing a brand new operate named checkValidityOfSeed that is engineered to transmit the stolen info to an exterior area (“0x9c[.]xyz”).

It is value noting that “mukulljangid” probably belongs to a Ripple worker, indicating that their npm account was hacked to drag off the provision chain assault.
The attacker is claimed to have tried alternative ways to sneak within the backdoor whereas attempting to evade detection, as evidenced by the completely different variations launched in a brief span of time. There isn’t any proof that the related GitHub repository has been backdoored.
It is not clear who’s behind the assault, but it surely’s believed that the risk actors managed to steal the developer’s npm entry token to tamper with the library, per Aikido.
In gentle of the incident, customers counting on the xrpl.js library are suggested to replace their situations to the most recent model (4.2.5 and a pair of.14.3) to mitigate potential threats.
“This vulnerability is in xrpl.js, a JavaScript library for interacting with the XRP Ledger,” the XRP Ledger Basis mentioned in a publish on X. “It doesn’t have an effect on the XRP Ledger codebase or GitHub repository itself. Initiatives utilizing xrpl.js ought to improve to v4.2.5 instantly.”
Replace
The provision chain compromise of xrpl.js has been assigned the CVE identifier CVE-2025-32965 (CVSS rating: 9.3).
“Variations 4.2.1, 4.2.2, 4.2.3, and 4.2.4 of xrpl.js had been compromised and contained malicious code designed to exfiltrate personal keys,” based on a GitHub advisory. “In case you are utilizing considered one of these variations, cease instantly and rotate any personal keys or secrets and techniques used with affected programs.”
“Model 2.14.2 can be malicious, although it’s much less prone to result in exploitation as it’s not appropriate with different 2.x variations. To safe funds, consider carefully about whether or not any keys might have been compromised by this provide chain assault, and mitigate by sending funds to safe wallets, and/or rotating keys.”