Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-bh69-2dsz-2qbf
Vulnerability ID VCID-bh69-2dsz-2qbf
Aliases CVE-2026-34769
GHSA-9wfr-w7mm-pc7f
Summary Electron: Renderer command-line switch injection via undocumented commandLineSwitches webPreference ### Impact An undocumented `commandLineSwitches` webPreference allowed arbitrary switches to be appended to the renderer process command line. Apps that construct `webPreferences` by spreading untrusted configuration objects may inadvertently allow an attacker to inject switches that disable renderer sandboxing or web security controls. Apps are only affected if they construct `webPreferences` from external or untrusted input without an allowlist. Apps that use a fixed, hardcoded `webPreferences` object are not affected. ### Workarounds Do not spread untrusted input into `webPreferences`. Use an explicit allowlist of permitted preference keys when constructing `BrowserWindow` or `webContents` options from external configuration. ### Fixed Versions * `41.0.0-beta.8` * `40.7.0` * `39.8.0` * `38.8.6` ### For more information If there are any questions or comments about this advisory, send an email to [security@electronjs.org](mailto:security@electronjs.org)
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 7.7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34769.json
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2026-34769
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2026-34769
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2026-34769
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2026-34769
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2026-34769
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2026-34769
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2026-34769
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2026-34769
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2026-34769
epss 7e-05 https://api.first.org/data/v1/epss?cve=CVE-2026-34769
epss 7e-05 https://api.first.org/data/v1/epss?cve=CVE-2026-34769
epss 7e-05 https://api.first.org/data/v1/epss?cve=CVE-2026-34769
epss 7e-05 https://api.first.org/data/v1/epss?cve=CVE-2026-34769
epss 8e-05 https://api.first.org/data/v1/epss?cve=CVE-2026-34769
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-9wfr-w7mm-pc7f
cvssv3.1 7.7 https://github.com/electron/electron
generic_textual HIGH https://github.com/electron/electron
cvssv3.1 7.7 https://github.com/electron/electron/security/advisories/GHSA-9wfr-w7mm-pc7f
cvssv3.1 7.8 https://github.com/electron/electron/security/advisories/GHSA-9wfr-w7mm-pc7f
cvssv3.1_qr HIGH https://github.com/electron/electron/security/advisories/GHSA-9wfr-w7mm-pc7f
generic_textual HIGH https://github.com/electron/electron/security/advisories/GHSA-9wfr-w7mm-pc7f
ssvc Track https://github.com/electron/electron/security/advisories/GHSA-9wfr-w7mm-pc7f
cvssv3.1 7.7 https://nvd.nist.gov/vuln/detail/CVE-2026-34769
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2026-34769
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34769.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Found at https://github.com/electron/electron
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Found at https://github.com/electron/electron/security/advisories/GHSA-9wfr-w7mm-pc7f
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Found at https://github.com/electron/electron/security/advisories/GHSA-9wfr-w7mm-pc7f
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-06T15:34:49Z/ Found at https://github.com/electron/electron/security/advisories/GHSA-9wfr-w7mm-pc7f
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2026-34769
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.05422
EPSS Score 0.0002
Published At April 4, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-03T21:42:22.297045+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-9wfr-w7mm-pc7f/GHSA-9wfr-w7mm-pc7f.json 38.1.0