An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWo0Y2gtbXc2Ni14bXF2

Malicious Package in pensi-scheduler

Version 1.1.3 of pensi-scheduler contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to


Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.

Users may consider downgrading to version 1.1.2

Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: almost 4 years ago
Updated: 12 months ago

Identifiers: GHSA-j4ch-mw66-xmqv
References: Blast Radius: 0.0

Affected Packages

Dependent packages: 2
Dependent repositories: 1
Downloads: 45 last month
Affected Version Ranges: = 1.1.3
No known fixed version
All affected versions: