Changeflow GovPing Data Privacy & Cybersecurity Bitwarden CLI Supply Chain Attack: Malicious Ve...
Priority review Notice Added Final

Bitwarden CLI Supply Chain Attack: Malicious Version 2026.4.0 Exfiltrates Credentials

Favicon for www.csirt.gov.it Italy CSIRT Advisories
Published
Detected
Email

Summary

Italy's national CSIRT (CSIRT-ITA) has issued a high-criticality advisory regarding a supply chain attack targeting Bitwarden CLI. On April 22, 2026, a malicious version of @bitwarden/cli (2026.4.0) was published to the npm registry, subsequently deprecated and removed. The compromised package was designed to automatically activate during CLI installation/execution and exfiltrate credentials and secrets including GitHub tokens, npm tokens, SSH keys, and cloud credentials from affected systems. The threat is particularly acute for development and CI/CD environments where Bitwarden CLI is commonly deployed. Users who installed version 2026.4.0 should treat their environments as potentially compromised and implement recommended mitigation measures.

Why this matters

Organizations using Bitwarden CLI in automated pipelines should audit their npm installation logs for the April 22, 2026 exposure window and treat any matching installations as compromised until remediated. The broader TeamPCP campaign pattern—compromising widely-used development tools (Trivy, Checkmarx, LiteLLM, now Bitwarden CLI)—suggests organizations with extensive CI/CD dependencies should inventory all npm-installed tooling and verify package integrity independently rather than relying solely on npm publication dates.

AI-drafted from the source document, validated against GovPing's analyst note standards . For the primary regulatory language, read the source document .
Published by ACN on acn.gov.it . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

About this source

GovPing monitors Italy CSIRT Advisories for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 8 changes logged to date.

What changed

The ACN CSIRT-ITA bulletin documents a confirmed supply chain compromise of the Bitwarden CLI npm package. A malicious version (2026.4.0) was published to the npm registry on April 22, 2026, containing embedded code designed to harvest credentials and secrets from affected systems. The package was subsequently deprecated and removed from distribution.

The bulletin identifies specific attack typologies (Remote Code Execution, Information Disclosure, Tampering) and provides detailed remediation guidance including uninstallation, cache cleanup, temporary disabling of npm scripts, credential rotation, and verification of CI/CD/GitHub configurations. The incident is contextualized within a broader campaign that previously targeted Trivy, Checkmarx, and LiteLLM projects, attributed to the threat actor TeamPCP.

Affected parties include developers, DevOps engineers, and organizations that installed Bitwarden CLI v2026.4.0 via npm during the exposure window. These users must conduct security reviews of their environments, assume compromise, rotate all exposed secrets, and reinstall the patched version (2026.4.1). Security teams should also review related bulletins covering the broader TeamPCP supply chain campaign.

What to do next

  1. Uninstall the compromised version: npm uninstall -g @bitwarden/cli
  2. Clean the npm cache: npm cache clean --force
  3. Rotate all potentially exposed credentials including API tokens, SSH keys, and development/automation credentials
  4. Verify GitHub repositories, CI/CD workflows, and associated credentials for unauthorized access or anomalous modifications
  5. After completing mitigation, install the secure version: npm install -g @bitwarden/cli@2026.4.1

Get daily alerts for Italy CSIRT Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from ACN.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
ACN
Published
April 24th, 2026
Instrument
Notice
Branch
Executive
Source language
it
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
BL01/260424/CSIRT-ITA

Who this affects

Applies to
Technology companies Manufacturers Healthcare providers
Industry sector
5112 Software & Technology
Activity scope
Supply chain security incident response Credential exposure remediation CI/CD environment hardening
Geographic scope
IT IT

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Data Privacy Consumer Protection Software & Technology

Get alerts for this source

We'll email you when Italy CSIRT Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!