Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-erya-bqnr-1qht
Vulnerability ID VCID-erya-bqnr-1qht
Aliases CVE-2026-34772
GHSA-9w97-2464-8783
Summary Electron: Use-after-free in download save dialog callback ### Impact Apps that allow downloads and programmatically destroy sessions may be vulnerable to a use-after-free. If a session is torn down while a native save-file dialog is open for a download, dismissing the dialog dereferences freed memory, which may lead to a crash or memory corruption. Apps that do not destroy sessions at runtime, or that do not permit downloads, are not affected. ### Workarounds Avoid destroying sessions while a download save dialog may be open. Cancel pending downloads before session teardown. ### Fixed Versions * `41.0.0-beta.7` * `40.7.0` * `39.8.0` * `38.8.6` ### For more information If there are any questions or comments about this advisory, please email [security@electronjs.org](mailto:security@electronjs.org)
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 5.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34772.json
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2026-34772
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2026-34772
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2026-34772
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2026-34772
epss 0.00016 https://api.first.org/data/v1/epss?cve=CVE-2026-34772
epss 0.00016 https://api.first.org/data/v1/epss?cve=CVE-2026-34772
epss 0.00016 https://api.first.org/data/v1/epss?cve=CVE-2026-34772
epss 0.00017 https://api.first.org/data/v1/epss?cve=CVE-2026-34772
epss 0.00017 https://api.first.org/data/v1/epss?cve=CVE-2026-34772
epss 0.00017 https://api.first.org/data/v1/epss?cve=CVE-2026-34772
epss 0.00017 https://api.first.org/data/v1/epss?cve=CVE-2026-34772
epss 0.00017 https://api.first.org/data/v1/epss?cve=CVE-2026-34772
epss 0.00017 https://api.first.org/data/v1/epss?cve=CVE-2026-34772
epss 6e-05 https://api.first.org/data/v1/epss?cve=CVE-2026-34772
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-9w97-2464-8783
cvssv3.1 5.8 https://github.com/electron/electron
generic_textual MODERATE https://github.com/electron/electron
cvssv3.1 5.8 https://github.com/electron/electron/security/advisories/GHSA-9w97-2464-8783
cvssv3.1_qr MODERATE https://github.com/electron/electron/security/advisories/GHSA-9w97-2464-8783
generic_textual MODERATE https://github.com/electron/electron/security/advisories/GHSA-9w97-2464-8783
ssvc Track https://github.com/electron/electron/security/advisories/GHSA-9w97-2464-8783
cvssv3.1 5.8 https://nvd.nist.gov/vuln/detail/CVE-2026-34772
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2026-34772
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34772.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L Found at https://github.com/electron/electron
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L Found at https://github.com/electron/electron/security/advisories/GHSA-9w97-2464-8783
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-06T15:27:31Z/ Found at https://github.com/electron/electron/security/advisories/GHSA-9w97-2464-8783
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2026-34772
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.02212
EPSS Score 0.00013
Published At April 24, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-03T21:42:20.992906+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-9w97-2464-8783/GHSA-9w97-2464-8783.json 38.1.0