Accessibility Tools

Security incident in the open source community - our products are not affected

A recent security incident is attracting a lot of attention in the open source community: Several infected NPM packages contain self-propagating malware that can automatically spread to other packages. According to heise.de, this is a particularly aggressive form of supply chain attack.

What does this mean for our customers?

We reacted immediately and checked all our products for affected dependencies.

✅ Good news: None of the compromised packages are part of our software - neither in current nor in older versions.

This concerns, among other things:

  • pitFM Expert
  • pitFM Expert Web
  • pitFM Smart
  • pitFM Mobile
  • pitFM 2GO

We are continuing to monitor the situation very closely. If another affected parcel that we use is identified in the next few days, we will of course inform you immediately and take all necessary measures.

What can you do?

If you use your own software projects or scripts with NPM dependencies, we recommend the following steps:

  • Check the packages you use for known vulnerabilities
  • Use automated security checks (e.g. npm audit, Snyk, etc.)
  • Keep your dependencies regularly up to date (patch management)

If you have any questions or uncertainties, our support team is always available to help.

Stay up to date

More articles

Unanswered questions?

Our team looks forward to your inquiry.