Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:npm/electron@30.0.5
purl pkg:npm/electron@30.0.5
Next non-vulnerable version 35.7.5
Latest non-vulnerable version 42.0.0-alpha.5
Risk 3.1
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-qd52-rbd7-qkbn
Aliases:
CVE-2025-55305
GHSA-vmqv-hx8q-j7mg
Electron has ASAR Integrity Bypass via resource modification ### Impact This only impacts apps that have the `embeddedAsarIntegrityValidation` and `onlyLoadAppFromAsar` [fuses](https://www.electronjs.org/docs/latest/tutorial/fuses) enabled. Apps without these fuses enabled are not impacted. Specifically this issue can only be exploited if your app is launched from a filesystem the attacker has write access too. i.e. the ability to edit files inside the `resources` folder in your app installation on Windows which these fuses are supposed to protect against. ### Workarounds There are no app side workarounds, you must update to a patched version of Electron. ### Fixed Versions * `38.0.0-beta.6` * `37.3.1` * `36.8.1` * `35.7.5` ### For more information If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org)
35.7.5
Affected by 0 other vulnerabilities.
36.8.1
Affected by 0 other vulnerabilities.
37.3.1
Affected by 0 other vulnerabilities.
38.0.0-beta.6
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-fuwj-56jp-tyds electron ASAR Integrity bypass by just modifying the content electron's ASAR Integrity can be bypass by modifying the content. ### Impact This only impacts apps that have the `embeddedAsarIntegrityValidation` and `onlyLoadAppFromAsar` [fuses](https://www.electronjs.org/docs/latest/tutorial/fuses) enabled. Apps without these fuses enabled are not impacted. This issue is specific to Windows, apps using these fuses on macOS are unimpacted. Specifically this issue can only be exploited if your app is launched from a filesystem the attacker has write access too. i.e. the ability to edit files inside the .app bundle on macOS which these fuses are supposed to protect against. ### Workarounds There are no app side workarounds, you must update to a patched version of Electron. ### Fixed Versions * `30.0.5` * `31.0.0-beta.1` ### For more information If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org) CVE-2024-46992
GHSA-xw5q-g62x-2qjc

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T23:40:00.170323+00:00 GitLab Importer Affected by VCID-qd52-rbd7-qkbn https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/electron/CVE-2025-55305.yml 38.4.0
2026-04-16T23:32:01.547402+00:00 GitLab Importer Fixing VCID-fuwj-56jp-tyds https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/electron/CVE-2024-46992.yml 38.4.0
2026-04-12T01:00:45.838606+00:00 GitLab Importer Affected by VCID-qd52-rbd7-qkbn https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/electron/CVE-2025-55305.yml 38.3.0
2026-04-12T00:51:53.732654+00:00 GitLab Importer Fixing VCID-fuwj-56jp-tyds https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/electron/CVE-2024-46992.yml 38.3.0
2026-04-07T04:58:08.022280+00:00 GHSA Importer Fixing VCID-fuwj-56jp-tyds https://github.com/advisories/GHSA-xw5q-g62x-2qjc 38.1.0
2026-04-03T01:08:58.214650+00:00 GitLab Importer Affected by VCID-qd52-rbd7-qkbn https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/electron/CVE-2025-55305.yml 38.1.0
2026-04-03T00:59:58.526560+00:00 GitLab Importer Fixing VCID-fuwj-56jp-tyds https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/electron/CVE-2024-46992.yml 38.1.0
2026-04-02T12:41:38.714417+00:00 GitLab Importer Fixing VCID-fuwj-56jp-tyds https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/electron/CVE-2024-46992.yml 38.0.0
2026-04-01T12:56:48.519206+00:00 GithubOSV Importer Fixing VCID-fuwj-56jp-tyds https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-xw5q-g62x-2qjc/GHSA-xw5q-g62x-2qjc.json 38.0.0