Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-ktbs-t8kb-5kch
Vulnerability ID VCID-ktbs-t8kb-5kch
Aliases CVE-2026-34770
GHSA-jjp3-mq3x-295m
Summary Electron: Use-after-free in PowerMonitor on Windows and macOS ### Impact Apps that use the `powerMonitor` module may be vulnerable to a use-after-free. After the native `PowerMonitor` object is garbage-collected, the associated OS-level resources (a message window on Windows, a shutdown handler on macOS) retain dangling references. A subsequent session-change event (Windows) or system shutdown (macOS) dereferences freed memory, which may lead to a crash or memory corruption. All apps that access `powerMonitor` events (`suspend`, `resume`, `lock-screen`, etc.) are potentially affected. The issue is not directly renderer-controllable. ### Workarounds There are no app side workarounds, you must update to a patched version of Electron. ### Fixed Versions * `41.0.0-beta.8` * `40.8.0` * `39.8.1` * `38.8.6` ### For more information If there are any questions or comments about this advisory, please email [security@electronjs.org](mailto:security@electronjs.org)
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2026-34770
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2026-34770
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2026-34770
epss 0.00014 https://api.first.org/data/v1/epss?cve=CVE-2026-34770
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2026-34770
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2026-34770
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2026-34770
epss 0.00017 https://api.first.org/data/v1/epss?cve=CVE-2026-34770
epss 0.00017 https://api.first.org/data/v1/epss?cve=CVE-2026-34770
epss 0.00017 https://api.first.org/data/v1/epss?cve=CVE-2026-34770
epss 0.00017 https://api.first.org/data/v1/epss?cve=CVE-2026-34770
epss 0.00017 https://api.first.org/data/v1/epss?cve=CVE-2026-34770
epss 0.00017 https://api.first.org/data/v1/epss?cve=CVE-2026-34770
epss 6e-05 https://api.first.org/data/v1/epss?cve=CVE-2026-34770
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-jjp3-mq3x-295m
cvssv3.1 7.0 https://github.com/electron/electron
generic_textual HIGH https://github.com/electron/electron
cvssv3.1 7 https://github.com/electron/electron/security/advisories/GHSA-jjp3-mq3x-295m
cvssv3.1 7.0 https://github.com/electron/electron/security/advisories/GHSA-jjp3-mq3x-295m
cvssv3.1_qr HIGH https://github.com/electron/electron/security/advisories/GHSA-jjp3-mq3x-295m
generic_textual HIGH https://github.com/electron/electron/security/advisories/GHSA-jjp3-mq3x-295m
ssvc Track https://github.com/electron/electron/security/advisories/GHSA-jjp3-mq3x-295m
cvssv3.1 7.0 https://nvd.nist.gov/vuln/detail/CVE-2026-34770
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2026-34770
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/electron/electron
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/electron/electron/security/advisories/GHSA-jjp3-mq3x-295m
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/electron/electron/security/advisories/GHSA-jjp3-mq3x-295m
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-06T19:09:58Z/ Found at https://github.com/electron/electron/security/advisories/GHSA-jjp3-mq3x-295m
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2026-34770
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.02212
EPSS Score 0.00013
Published At April 24, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-03T21:42:22.982169+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-jjp3-mq3x-295m/GHSA-jjp3-mq3x-295m.json 38.1.0