Description
Bruno is an open source IDE for exploring and testing APIs. Prior to 3.2.1, Bruno was affected by a supply chain attack involving compromised versions of the axios npm package, which introduced a hidden dependency deploying a cross-platform Remote Access Trojan (RAT). Users of @usebruno/cli who ran npm install between 00:21 UTC and ~03:30 UTC on March 31, 2026 may have been impacted. Upgrade to 3.2.1
Published: 2026-04-06
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Bruno is a popular open‑source IDE for API testing. A compromised version of the widely used Axios library was injected with a hidden dependency that deployed a cross‑platform Remote Access Trojan. The backdoor allows an attacker to gain remote code execution, enabling full control over the affected system and posing a threat to confidentiality, integrity and availability. This vulnerability is characterized by CWE‑494 (Download of Untrusted Code) and CWE‑506 (Embedded Obfuscated Data).

Affected Systems

All installations of Bruno prior to version 3.2.1 that were built using npm between 00:21 and 03:30 UTC on March 31 2026 are potentially compromised. Users of @usebruno/cli who executed npm install during that narrow window may have inadvertently added the malicious Axios package. The issue affects the Bruno IDE (usebruno bruno) and any projects that depend on the vulnerable Axios dependency. No other vendors or products are listed as impacted.

Risk and Exploitability

The CVSS base score is 9.8, indicating critical severity, although the EPSS score is not available. The vulnerability is not currently listed in the CISA KEV catalog, but the nature of the supply‑chain compromise suggests that exploitation could have already occurred, especially given the global use of Axios. Attackers would need to execute npm install of the poisoned package, which is a common workflow for developers. The window of exposure is limited to a few hours, yet any affected installation remains vulnerable until the library is updated. Immediate remediation is essential for any organization that still uses a compromised version.

Generated by OpenCVE AI on April 6, 2026 at 19:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Bruno to version 3.2.1 or later to replace the compromised Axios dependency.
  • Reinstall all project dependencies with a clean npm cache to remove any malicious packages.
  • Verify package lock files and run npm audit to ensure no other vulnerable dependencies remain.
  • Consider enabling package integrity checks (e.g., npm ci or npm audit) to prevent future supply‑chain attacks.

Generated by OpenCVE AI on April 6, 2026 at 19:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-658g-p7jg-wx5g Axios npm Supply Chain Incident Impacting @usebruno/cli
History

Wed, 22 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:usebruno:bruno:*:*:*:*:*:*:*:*

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Usebruno
Usebruno bruno
Vendors & Products Usebruno
Usebruno bruno

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Description Bruno is an open source IDE for exploring and testing APIs. Prior to 3.2.1, Bruno was affected by a supply chain attack involving compromised versions of the axios npm package, which introduced a hidden dependency deploying a cross-platform Remote Access Trojan (RAT). Users of @usebruno/cli who ran npm install between 00:21 UTC and ~03:30 UTC on March 31, 2026 may have been impacted. Upgrade to 3.2.1
Title Axios npm Supply Chain Incident Impacting @usebruno/cli
Weaknesses CWE-494
CWE-506
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-08T03:55:33.960Z

Reserved: 2026-03-30T20:52:53.285Z

Link: CVE-2026-34841

cve-icon Vulnrichment

Updated: 2026-04-06T18:44:10.302Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T17:17:10.590

Modified: 2026-04-22T20:04:08.253

Link: CVE-2026-34841

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:31:43Z

Weaknesses