Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-uwqv-4aqn-87fd
Vulnerability ID VCID-uwqv-4aqn-87fd
Aliases CVE-2026-34768
GHSA-jfqx-fxh3-c62j
Summary Electron: Unquoted executable path in app.setLoginItemSettings on Windows ### Impact On Windows, `app.setLoginItemSettings({openAtLogin: true})` wrote the executable path to the `Run` registry key without quoting. If the app is installed to a path containing spaces, an attacker with write access to an ancestor directory may be able to cause a different executable to run at login instead of the intended app. On a default Windows install, standard system directories are protected against writes by standard users, so exploitation typically requires a non-standard install location. ### Workarounds Install the application to a path without spaces, or to a location where all ancestor directories are protected against unauthorized writes. ### Fixed Versions * `41.0.0-beta.8` * `40.8.0` * `39.8.1` * `38.8.6` ### For more information If there are any questions or comments about this advisory, send an email to [security@electronjs.org](mailto:security@electronjs.org)
Status Published
Exploitability 0.5
Weighted Severity 3.5
Risk 1.8
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 3.9 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34768.json
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2026-34768
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2026-34768
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2026-34768
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2026-34768
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2026-34768
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2026-34768
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2026-34768
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2026-34768
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2026-34768
epss 6e-05 https://api.first.org/data/v1/epss?cve=CVE-2026-34768
epss 6e-05 https://api.first.org/data/v1/epss?cve=CVE-2026-34768
epss 6e-05 https://api.first.org/data/v1/epss?cve=CVE-2026-34768
epss 6e-05 https://api.first.org/data/v1/epss?cve=CVE-2026-34768
cvssv3.1_qr LOW https://github.com/advisories/GHSA-jfqx-fxh3-c62j
cvssv3.1 3.9 https://github.com/electron/electron
generic_textual LOW https://github.com/electron/electron
cvssv3.1 3.9 https://github.com/electron/electron/security/advisories/GHSA-jfqx-fxh3-c62j
cvssv3.1_qr LOW https://github.com/electron/electron/security/advisories/GHSA-jfqx-fxh3-c62j
generic_textual LOW https://github.com/electron/electron/security/advisories/GHSA-jfqx-fxh3-c62j
ssvc Track https://github.com/electron/electron/security/advisories/GHSA-jfqx-fxh3-c62j
cvssv3.1 3.9 https://nvd.nist.gov/vuln/detail/CVE-2026-34768
generic_textual LOW https://nvd.nist.gov/vuln/detail/CVE-2026-34768
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34768.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/electron/electron
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/electron/electron/security/advisories/GHSA-jfqx-fxh3-c62j
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-06T19:08:45Z/ Found at https://github.com/electron/electron/security/advisories/GHSA-jfqx-fxh3-c62j
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2026-34768
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.01499
EPSS Score 0.00012
Published At April 4, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-03T21:42:23.572044+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-jfqx-fxh3-c62j/GHSA-jfqx-fxh3-c62j.json 38.1.0