Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-2uv6-6zfm-x7c6
Vulnerability ID VCID-2uv6-6zfm-x7c6
Aliases CVE-2026-34773
GHSA-mwmh-mq4g-g6gr
Summary Electron: Registry key path injection in app.setAsDefaultProtocolClient on Windows ### Impact On Windows, `app.setAsDefaultProtocolClient(protocol)` did not validate the protocol name before writing to the registry. Apps that pass untrusted input as the protocol name may allow an attacker to write to arbitrary subkeys under `HKCU\Software\Classes\`, potentially hijacking existing protocol handlers. Apps are only affected if they call `app.setAsDefaultProtocolClient()` with a protocol name derived from external or untrusted input. Apps that use a hardcoded protocol name are not affected. ### Workarounds Validate the protocol name matches `/^[a-zA-Z][a-zA-Z0-9+.-]*$/` before passing it to `app.setAsDefaultProtocolClient()`. ### Fixed Versions * `41.0.0` * `40.8.1` * `39.8.1` * `38.8.6` ### For more information If there are any questions or comments about this advisory, please email [security@electronjs.org](mailto:security@electronjs.org)
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (5)
System Score Found at
cvssv3 4.7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34773.json
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2026-34773
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2026-34773
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2026-34773
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2026-34773
epss 0.00023 https://api.first.org/data/v1/epss?cve=CVE-2026-34773
epss 0.00023 https://api.first.org/data/v1/epss?cve=CVE-2026-34773
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2026-34773
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2026-34773
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2026-34773
epss 0.00031 https://api.first.org/data/v1/epss?cve=CVE-2026-34773
epss 0.00031 https://api.first.org/data/v1/epss?cve=CVE-2026-34773
epss 0.00031 https://api.first.org/data/v1/epss?cve=CVE-2026-34773
epss 0.00031 https://api.first.org/data/v1/epss?cve=CVE-2026-34773
epss 0.00031 https://api.first.org/data/v1/epss?cve=CVE-2026-34773
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-mwmh-mq4g-g6gr
cvssv3.1 4.7 https://github.com/electron/electron
generic_textual MODERATE https://github.com/electron/electron
cvssv3.1 4.7 https://github.com/electron/electron/security/advisories/GHSA-mwmh-mq4g-g6gr
cvssv3.1_qr MODERATE https://github.com/electron/electron/security/advisories/GHSA-mwmh-mq4g-g6gr
generic_textual MODERATE https://github.com/electron/electron/security/advisories/GHSA-mwmh-mq4g-g6gr
ssvc Track https://github.com/electron/electron/security/advisories/GHSA-mwmh-mq4g-g6gr
cvssv3.1 4.7 https://nvd.nist.gov/vuln/detail/CVE-2026-34773
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2026-34773
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34773.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N Found at https://github.com/electron/electron
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N Found at https://github.com/electron/electron/security/advisories/GHSA-mwmh-mq4g-g6gr
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-06T16:03:47Z/ Found at https://github.com/electron/electron/security/advisories/GHSA-mwmh-mq4g-g6gr
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2026-34773
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.0158
EPSS Score 0.00012
Published At April 21, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-03T21:42:21.309867+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-mwmh-mq4g-g6gr/GHSA-mwmh-mq4g-g6gr.json 38.1.0