| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-2uv6-6zfm-x7c6 |
| vulnerability_id |
VCID-2uv6-6zfm-x7c6 |
| summary |
Electron: Registry key path injection in app.setAsDefaultProtocolClient on Windows
### Impact
On Windows, `app.setAsDefaultProtocolClient(protocol)` did not validate the protocol name before writing to the registry. Apps that pass untrusted input as the protocol name may allow an attacker to write to arbitrary subkeys under `HKCU\Software\Classes\`, potentially hijacking existing protocol handlers.
Apps are only affected if they call `app.setAsDefaultProtocolClient()` with a protocol name derived from external or untrusted input. Apps that use a hardcoded protocol name are not affected.
### Workarounds
Validate the protocol name matches `/^[a-zA-Z][a-zA-Z0-9+.-]*$/` before passing it to `app.setAsDefaultProtocolClient()`.
### Fixed Versions
* `41.0.0`
* `40.8.1`
* `39.8.1`
* `38.8.6`
### For more information
If there are any questions or comments about this advisory, please email [security@electronjs.org](mailto:security@electronjs.org) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34773 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0158 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05499 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05457 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05501 |
| published_at |
2026-04-29T12:55:00Z |
|
| 4 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06326 |
| published_at |
2026-05-05T12:55:00Z |
|
| 5 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07869 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07912 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07927 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08958 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08971 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08849 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08824 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.09008 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34773 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34773, GHSA-mwmh-mq4g-g6gr
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2uv6-6zfm-x7c6 |
|
| 1 |
| url |
VCID-7yvz-624p-m7fe |
| vulnerability_id |
VCID-7yvz-624p-m7fe |
| summary |
Electron: Use-after-free in offscreen shared texture release() callback |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34764 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02673 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.027 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0268 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02678 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03435 |
| published_at |
2026-05-05T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0489 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05044 |
| published_at |
2026-04-29T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05045 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05004 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04973 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04829 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04871 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04819 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34764 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34764, GHSA-8x5q-pvf5-64mp
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7yvz-624p-m7fe |
|
| 2 |
| url |
VCID-cjzy-nxnq-ffdp |
| vulnerability_id |
VCID-cjzy-nxnq-ffdp |
| summary |
Electron: nodeIntegrationInWorker not correctly scoped in shared renderer processes
### Impact
The `nodeIntegrationInWorker` webPreference was not correctly scoped in all configurations. In certain process-sharing scenarios, workers spawned in frames configured with `nodeIntegrationInWorker: false` could still receive Node.js integration.
Apps are only affected if they enable `nodeIntegrationInWorker`. Apps that do not use `nodeIntegrationInWorker` are not affected.
### Workarounds
Avoid enabling `nodeIntegrationInWorker` in apps that also open child windows or embed content with differing webPreferences.
### Fixed Versions
* `41.0.0`
* `40.8.4`
* `39.8.4`
* `38.8.6`
### For more information
If there are any questions or comments about this advisory, please email [security@electronjs.org](mailto:security@electronjs.org) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34775 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01183 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01716 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01688 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01692 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02059 |
| published_at |
2026-05-05T12:55:00Z |
|
| 5 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08851 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08839 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08773 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09618 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09747 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.0959 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09731 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09767 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.0978 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34775 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34775, GHSA-xwr5-m59h-vwqr
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cjzy-nxnq-ffdp |
|
| 3 |
| url |
VCID-gxk8-9wc6-wkhs |
| vulnerability_id |
VCID-gxk8-9wc6-wkhs |
| summary |
Electron: Service worker can spoof executeJavaScript IPC replies
### Impact
A service worker running in a session could spoof reply messages on the internal IPC channel used by `webContents.executeJavaScript()` and related methods, causing the main-process promise to resolve with attacker-controlled data.
Apps are only affected if they have service workers registered and use the result of `webContents.executeJavaScript()` (or `webFrameMain.executeJavaScript()`) in security-sensitive decisions.
### Workarounds
Do not trust the return value of `webContents.executeJavaScript()` for security decisions. Use dedicated, validated IPC channels for security-relevant communication with renderers.
### Fixed Versions
* `41.0.0`
* `40.8.1`
* `39.8.1`
* `38.8.6`
### For more information
If there are any questions or comments about this advisory, please email [security@electronjs.org](mailto:security@electronjs.org) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34778 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02427 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02428 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02431 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03226 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03253 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03295 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03189 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03178 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00434 |
| published_at |
2026-05-05T12:55:00Z |
|
| 10 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00312 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00313 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00311 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00307 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34778 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34778, GHSA-xj5x-m3f3-5x3h
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gxk8-9wc6-wkhs |
|
| 4 |
| url |
VCID-hynm-7wty-ruhq |
| vulnerability_id |
VCID-hynm-7wty-ruhq |
| summary |
Electron: AppleScript injection in app.moveToApplicationsFolder on macOS
### Impact
On macOS, `app.moveToApplicationsFolder()` used an AppleScript fallback path that did not properly handle certain characters in the application bundle path. Under specific conditions, a crafted launch path could lead to arbitrary AppleScript execution when the user accepted the move-to-Applications prompt.
Apps are only affected if they call `app.moveToApplicationsFolder()`. Apps that do not use this API are not affected.
### Workarounds
There are no app side workarounds, developers must update to a patched version of Electron.
### Fixed Versions
* `41.0.0-beta.8`
* `40.8.0`
* `39.8.1`
* `38.8.6`
### For more information
If there are any questions or comments about this advisory, please email [security@electronjs.org](mailto:security@electronjs.org) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34779 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06306 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0633 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06393 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06353 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06913 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06929 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07132 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07143 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07124 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00955 |
| published_at |
2026-04-29T12:55:00Z |
|
| 10 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00954 |
| published_at |
2026-05-05T12:55:00Z |
|
| 11 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00958 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00962 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34779 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34779, GHSA-5rqw-r77c-jp79
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hynm-7wty-ruhq |
|
| 5 |
| url |
VCID-k7gj-cczw-wfeb |
| vulnerability_id |
VCID-k7gj-cczw-wfeb |
| summary |
Electron: Incorrect origin passed to permission request handler for iframe requests
### Impact
When an iframe requests `fullscreen`, `pointerLock`, `keyboardLock`, `openExternal`, or `media` permissions, the origin passed to `session.setPermissionRequestHandler()` was the top-level page's origin rather than the requesting iframe's origin. Apps that grant permissions based on the origin parameter or `webContents.getURL()` may inadvertently grant permissions to embedded third-party content.
The correct requesting URL remains available via `details.requestingUrl`. Apps that already check `details.requestingUrl` are not affected.
### Workarounds
In your `setPermissionRequestHandler`, inspect `details.requestingUrl` rather than the origin parameter or `webContents.getURL()` when deciding whether to grant `fullscreen`, `pointerLock`, `keyboardLock`, `openExternal`, or `media` permissions.
### Fixed Versions
* `41.0.0`
* `40.8.1`
* `39.8.1`
* `38.8.6`
### For more information
If there are any questions or comments about this advisory, please email [security@electronjs.org](mailto:security@electronjs.org) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34777 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02646 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02653 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02651 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03224 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03209 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03199 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03315 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03273 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03245 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00289 |
| published_at |
2026-04-29T12:55:00Z |
|
| 10 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00294 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00296 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0036 |
| published_at |
2026-05-05T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34777 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34777, GHSA-r5p7-gp4j-qhrx
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k7gj-cczw-wfeb |
|
| 6 |
| url |
VCID-ktbs-t8kb-5kch |
| vulnerability_id |
VCID-ktbs-t8kb-5kch |
| summary |
Electron: Use-after-free in PowerMonitor on Windows and macOS
### Impact
Apps that use the `powerMonitor` module may be vulnerable to a use-after-free. After the native `PowerMonitor` object is garbage-collected, the associated OS-level resources (a message window on Windows, a shutdown handler on macOS) retain dangling references. A subsequent session-change event (Windows) or system shutdown (macOS) dereferences freed memory, which may lead to a crash or memory corruption.
All apps that access `powerMonitor` events (`suspend`, `resume`, `lock-screen`, etc.) are potentially affected. The issue is not directly renderer-controllable.
### Workarounds
There are no app side workarounds, you must update to a patched version of Electron.
### Fixed Versions
* `41.0.0-beta.8`
* `40.8.0`
* `39.8.1`
* `38.8.6`
### For more information
If there are any questions or comments about this advisory, please email [security@electronjs.org](mailto:security@electronjs.org) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34770 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02212 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02238 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02201 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02809 |
| published_at |
2026-05-05T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03305 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0329 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03299 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03958 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0387 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03861 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03881 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0391 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03927 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00354 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34770 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34770, GHSA-jjp3-mq3x-295m
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ktbs-t8kb-5kch |
|
| 7 |
| url |
VCID-t1z9-bmnv-57bm |
| vulnerability_id |
VCID-t1z9-bmnv-57bm |
| summary |
Electron: HTTP Response Header Injection in custom protocol handlers and webRequest
### Impact
Apps that register custom protocol handlers via `protocol.handle()` / `protocol.registerSchemesAsPrivileged()` or modify response headers via `webRequest.onHeadersReceived` may be vulnerable to HTTP response header injection if attacker-controlled input is reflected into a response header name or value.
An attacker who can influence a header value may be able to inject additional response headers, affecting cookies, content security policy, or cross-origin access controls.
Apps that do not reflect external input into response headers are not affected.
### Workarounds
Validate or sanitize any untrusted input before including it in a response header name or value.
### Fixed Versions
* `41.0.3`
* `40.8.3`
* `39.8.3`
* `38.8.6`
### For more information
If there are any questions or comments about this advisory, send an email to [security@electronjs.org](mailto:security@electronjs.org) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34767 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01535 |
| published_at |
2026-05-05T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01281 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01285 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0128 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01274 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08164 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08159 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08105 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08944 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09178 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09288 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.0918 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09301 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.0933 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34767 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34767, GHSA-4p4r-m79c-wq3v
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t1z9-bmnv-57bm |
|
| 8 |
| url |
VCID-uwqv-4aqn-87fd |
| vulnerability_id |
VCID-uwqv-4aqn-87fd |
| summary |
Electron: Unquoted executable path in app.setLoginItemSettings on Windows
### Impact
On Windows, `app.setLoginItemSettings({openAtLogin: true})` wrote the executable path to the `Run` registry key without quoting. If the app is installed to a path containing spaces, an attacker with write access to an ancestor directory may be able to cause a different executable to run at login instead of the intended app.
On a default Windows install, standard system directories are protected against writes by standard users, so exploitation typically requires a non-standard install location.
### Workarounds
Install the application to a path without spaces, or to a location where all ancestor directories are protected against unauthorized writes.
### Fixed Versions
* `41.0.0-beta.8`
* `40.8.0`
* `39.8.1`
* `38.8.6`
### For more information
If there are any questions or comments about this advisory, send an email to [security@electronjs.org](mailto:security@electronjs.org) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34768 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01499 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0151 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01506 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01967 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01949 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01948 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01987 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01971 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03196 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00313 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00308 |
| published_at |
2026-04-29T12:55:00Z |
|
| 11 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00437 |
| published_at |
2026-05-05T12:55:00Z |
|
| 12 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00311 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34768 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34768, GHSA-jfqx-fxh3-c62j
|
| risk_score |
1.8 |
| exploitability |
0.5 |
| weighted_severity |
3.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uwqv-4aqn-87fd |
|
| 9 |
| url |
VCID-vda9-xbsz-d7fm |
| vulnerability_id |
VCID-vda9-xbsz-d7fm |
| summary |
Electron: Out-of-bounds read in second-instance IPC on macOS and Linux
### Impact
On macOS and Linux, apps that call `app.requestSingleInstanceLock()` were vulnerable to an out-of-bounds heap read when parsing a crafted second-instance message. Leaked memory could be delivered to the app's `second-instance` event handler.
This issue is limited to processes running as the same user as the Electron app.
Apps that do not call `app.requestSingleInstanceLock()` are not affected. Windows is not affected by this issue.
### Workarounds
There are no app side workarounds, developers must update to a patched version of Electron.
### Fixed Versions
* `41.0.0`
* `40.8.1`
* `39.8.1`
* `38.8.6`
### For more information
If there are any questions or comments about this advisory, please email [security@electronjs.org](mailto:security@electronjs.org) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34776 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.0121 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01662 |
| published_at |
2026-05-05T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02182 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02179 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02178 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02866 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0285 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02917 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02889 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02871 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0286 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00401 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00402 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34776 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34776, GHSA-3c8v-cfp5-9885
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vda9-xbsz-d7fm |
|
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-bh69-2dsz-2qbf |
| vulnerability_id |
VCID-bh69-2dsz-2qbf |
| summary |
Electron: Renderer command-line switch injection via undocumented commandLineSwitches webPreference
### Impact
An undocumented `commandLineSwitches` webPreference allowed arbitrary switches to be appended to the renderer process command line. Apps that construct `webPreferences` by spreading untrusted configuration objects may inadvertently allow an attacker to inject switches that disable renderer sandboxing or web security controls.
Apps are only affected if they construct `webPreferences` from external or untrusted input without an allowlist. Apps that use a fixed, hardcoded `webPreferences` object are not affected.
### Workarounds
Do not spread untrusted input into `webPreferences`. Use an explicit allowlist of permitted preference keys when constructing `BrowserWindow` or `webContents` options from external configuration.
### Fixed Versions
* `41.0.0-beta.8`
* `40.7.0`
* `39.8.0`
* `38.8.6`
### For more information
If there are any questions or comments about this advisory, send an email to [security@electronjs.org](mailto:security@electronjs.org) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34769 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05422 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05465 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0543 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05919 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05896 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05884 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05955 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05936 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05926 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00639 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0064 |
| published_at |
2026-04-29T12:55:00Z |
|
| 11 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00636 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00638 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00754 |
| published_at |
2026-05-05T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34769 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:npm/electron@39.8.0 |
| purl |
pkg:npm/electron@39.8.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2uv6-6zfm-x7c6 |
|
| 1 |
| vulnerability |
VCID-7yvz-624p-m7fe |
|
| 2 |
| vulnerability |
VCID-cjzy-nxnq-ffdp |
|
| 3 |
| vulnerability |
VCID-gxk8-9wc6-wkhs |
|
| 4 |
| vulnerability |
VCID-hynm-7wty-ruhq |
|
| 5 |
| vulnerability |
VCID-k7gj-cczw-wfeb |
|
| 6 |
| vulnerability |
VCID-ktbs-t8kb-5kch |
|
| 7 |
| vulnerability |
VCID-t1z9-bmnv-57bm |
|
| 8 |
| vulnerability |
VCID-ttvv-eca2-sfhu |
|
| 9 |
| vulnerability |
VCID-uwqv-4aqn-87fd |
|
| 10 |
| vulnerability |
VCID-vda9-xbsz-d7fm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/electron@39.8.0 |
|
| 2 |
|
| 3 |
|
|
| aliases |
CVE-2026-34769, GHSA-9wfr-w7mm-pc7f
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bh69-2dsz-2qbf |
|
| 1 |
| url |
VCID-erya-bqnr-1qht |
| vulnerability_id |
VCID-erya-bqnr-1qht |
| summary |
Electron: Use-after-free in download save dialog callback
### Impact
Apps that allow downloads and programmatically destroy sessions may be vulnerable to a use-after-free. If a session is torn down while a native save-file dialog is open for a download, dismissing the dialog dereferences freed memory, which may lead to a crash or memory corruption.
Apps that do not destroy sessions at runtime, or that do not permit downloads, are not affected.
### Workarounds
Avoid destroying sessions while a download save dialog may be open. Cancel pending downloads before session teardown.
### Fixed Versions
* `41.0.0-beta.7`
* `40.7.0`
* `39.8.0`
* `38.8.6`
### For more information
If there are any questions or comments about this advisory, please email [security@electronjs.org](mailto:security@electronjs.org) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34772 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02238 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02201 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02212 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02809 |
| published_at |
2026-05-05T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03422 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03403 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03419 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03969 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04028 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03981 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04014 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03986 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04055 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00368 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34772 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:npm/electron@39.8.0 |
| purl |
pkg:npm/electron@39.8.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2uv6-6zfm-x7c6 |
|
| 1 |
| vulnerability |
VCID-7yvz-624p-m7fe |
|
| 2 |
| vulnerability |
VCID-cjzy-nxnq-ffdp |
|
| 3 |
| vulnerability |
VCID-gxk8-9wc6-wkhs |
|
| 4 |
| vulnerability |
VCID-hynm-7wty-ruhq |
|
| 5 |
| vulnerability |
VCID-k7gj-cczw-wfeb |
|
| 6 |
| vulnerability |
VCID-ktbs-t8kb-5kch |
|
| 7 |
| vulnerability |
VCID-t1z9-bmnv-57bm |
|
| 8 |
| vulnerability |
VCID-ttvv-eca2-sfhu |
|
| 9 |
| vulnerability |
VCID-uwqv-4aqn-87fd |
|
| 10 |
| vulnerability |
VCID-vda9-xbsz-d7fm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/electron@39.8.0 |
|
| 2 |
|
| 3 |
| url |
pkg:npm/electron@41.0.0-beta.7 |
| purl |
pkg:npm/electron@41.0.0-beta.7 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2uv6-6zfm-x7c6 |
|
| 1 |
| vulnerability |
VCID-7yvz-624p-m7fe |
|
| 2 |
| vulnerability |
VCID-bh69-2dsz-2qbf |
|
| 3 |
| vulnerability |
VCID-cjzy-nxnq-ffdp |
|
| 4 |
| vulnerability |
VCID-gxk8-9wc6-wkhs |
|
| 5 |
| vulnerability |
VCID-hynm-7wty-ruhq |
|
| 6 |
| vulnerability |
VCID-k7gj-cczw-wfeb |
|
| 7 |
| vulnerability |
VCID-ktbs-t8kb-5kch |
|
| 8 |
| vulnerability |
VCID-phbq-fatc-mbh2 |
|
| 9 |
| vulnerability |
VCID-r7j1-66md-zkak |
|
| 10 |
| vulnerability |
VCID-t1z9-bmnv-57bm |
|
| 11 |
| vulnerability |
VCID-ttvv-eca2-sfhu |
|
| 12 |
| vulnerability |
VCID-uwqv-4aqn-87fd |
|
| 13 |
| vulnerability |
VCID-vda9-xbsz-d7fm |
|
| 14 |
| vulnerability |
VCID-vp7h-hm4e-quaj |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/electron@41.0.0-beta.7 |
|
|
| aliases |
CVE-2026-34772, GHSA-9w97-2464-8783
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-erya-bqnr-1qht |
|
| 2 |
| url |
VCID-phbq-fatc-mbh2 |
| vulnerability_id |
VCID-phbq-fatc-mbh2 |
| summary |
Electron: Context Isolation bypass via contextBridge VideoFrame transfer
### Impact
Apps that pass `VideoFrame` objects (from the WebCodecs API) across the `contextBridge` are vulnerable to a context isolation bypass. An attacker who can execute JavaScript in the main world (for example, via XSS) can use a bridged `VideoFrame` to gain access to the isolated world, including any Node.js APIs exposed to the preload script.
Apps are only affected if a preload script returns, resolves, or passes a `VideoFrame` object to the main world via `contextBridge.exposeInMainWorld()`. Apps that do not bridge `VideoFrame` objects are not affected.
### Workarounds
Do not pass `VideoFrame` objects across `contextBridge`. If an app needs to transfer video frame data, serialize it to an `ArrayBuffer` or `ImageBitmap` before bridging.
### Fixed Versions
* `41.0.0-beta.8`
* `40.7.0`
* `39.8.0`
### For more information
If there are any questions or comments about this advisory, please email [security@electronjs.org](mailto:security@electronjs.org) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34780 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01507 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01495 |
| published_at |
2026-05-05T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0149 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01498 |
| published_at |
2026-04-26T12:55:00Z |
|
| 4 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1006 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10037 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11704 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1184 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11788 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11918 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12978 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12898 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12942 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34780 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:npm/electron@39.8.0 |
| purl |
pkg:npm/electron@39.8.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2uv6-6zfm-x7c6 |
|
| 1 |
| vulnerability |
VCID-7yvz-624p-m7fe |
|
| 2 |
| vulnerability |
VCID-cjzy-nxnq-ffdp |
|
| 3 |
| vulnerability |
VCID-gxk8-9wc6-wkhs |
|
| 4 |
| vulnerability |
VCID-hynm-7wty-ruhq |
|
| 5 |
| vulnerability |
VCID-k7gj-cczw-wfeb |
|
| 6 |
| vulnerability |
VCID-ktbs-t8kb-5kch |
|
| 7 |
| vulnerability |
VCID-t1z9-bmnv-57bm |
|
| 8 |
| vulnerability |
VCID-ttvv-eca2-sfhu |
|
| 9 |
| vulnerability |
VCID-uwqv-4aqn-87fd |
|
| 10 |
| vulnerability |
VCID-vda9-xbsz-d7fm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/electron@39.8.0 |
|
| 1 |
|
| 2 |
|
|
| aliases |
CVE-2026-34780, GHSA-jfqg-hf23-qpw2
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-phbq-fatc-mbh2 |
|
| 3 |
| url |
VCID-r7j1-66md-zkak |
| vulnerability_id |
VCID-r7j1-66md-zkak |
| summary |
Electron: USB device selection not validated against filtered device list
### Impact
The `select-usb-device` event callback did not validate the chosen device ID against the filtered list that was presented to the handler. An app whose handler could be influenced to select a device ID outside the filtered set would grant access to a device that did not match the renderer's requested `filters` or was listed in `exclusionFilters`.
The WebUSB security blocklist remained enforced regardless, so security-sensitive devices on the blocklist were not affected. The practical impact is limited to apps with unusual device-selection logic.
### Workarounds
There are no app side workarounds, you must update to a patched version of Electron.
### Fixed Versions
* `41.0.0-beta.8`
* `40.7.0`
* `39.8.0`
* `38.8.6`
### For more information
If there are any questions or comments about this advisory, send an email to [security@electronjs.org](mailto:security@electronjs.org) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34766 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01355 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01291 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01302 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01307 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06559 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06648 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06567 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0664 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06655 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00802 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00799 |
| published_at |
2026-04-29T12:55:00Z |
|
| 11 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00804 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00803 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.01031 |
| published_at |
2026-05-05T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34766 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:npm/electron@39.8.0 |
| purl |
pkg:npm/electron@39.8.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2uv6-6zfm-x7c6 |
|
| 1 |
| vulnerability |
VCID-7yvz-624p-m7fe |
|
| 2 |
| vulnerability |
VCID-cjzy-nxnq-ffdp |
|
| 3 |
| vulnerability |
VCID-gxk8-9wc6-wkhs |
|
| 4 |
| vulnerability |
VCID-hynm-7wty-ruhq |
|
| 5 |
| vulnerability |
VCID-k7gj-cczw-wfeb |
|
| 6 |
| vulnerability |
VCID-ktbs-t8kb-5kch |
|
| 7 |
| vulnerability |
VCID-t1z9-bmnv-57bm |
|
| 8 |
| vulnerability |
VCID-ttvv-eca2-sfhu |
|
| 9 |
| vulnerability |
VCID-uwqv-4aqn-87fd |
|
| 10 |
| vulnerability |
VCID-vda9-xbsz-d7fm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/electron@39.8.0 |
|
| 2 |
|
| 3 |
|
|
| aliases |
CVE-2026-34766, GHSA-9899-m83m-qhpj
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r7j1-66md-zkak |
|
| 4 |
| url |
VCID-ttvv-eca2-sfhu |
| vulnerability_id |
VCID-ttvv-eca2-sfhu |
| summary |
Electron: Use-after-free in offscreen child window paint callback
### Impact
Apps that use offscreen rendering and allow child windows via `window.open()` may be vulnerable to a use-after-free. If the parent offscreen `WebContents` is destroyed while a child window remains open, subsequent paint frames on the child dereference freed memory, which may lead to a crash or memory corruption.
Apps are only affected if they use offscreen rendering (`webPreferences.offscreen: true`) and their `setWindowOpenHandler` permits child windows. Apps that do not use offscreen rendering, or that deny child windows, are not affected.
### Workarounds
Deny child window creation from offscreen renderers in your `setWindowOpenHandler`, or ensure child windows are closed before the parent is destroyed.
### Fixed Versions
* `41.0.0`
* `40.7.0`
* `39.8.1`
### For more information
If there are any questions or comments about this advisory, please email [security@electronjs.org](mailto:security@electronjs.org) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34774 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04115 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04664 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04638 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04604 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05329 |
| published_at |
2026-05-05T12:55:00Z |
|
| 5 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13074 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13196 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.12993 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.1754 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17645 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17549 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17595 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17673 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17691 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34774 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34774, GHSA-532v-xpq5-8h95
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ttvv-eca2-sfhu |
|
| 5 |
| url |
VCID-vp7h-hm4e-quaj |
| vulnerability_id |
VCID-vp7h-hm4e-quaj |
| summary |
Electron: Use-after-free in WebContents fullscreen, pointer-lock, and keyboard-lock permission callbacks
### Impact
Apps that register an asynchronous `session.setPermissionRequestHandler()` may be vulnerable to a use-after-free when handling fullscreen, pointer-lock, or keyboard-lock permission requests. If the requesting frame navigates or the window closes while the permission handler is pending, invoking the stored callback dereferences freed memory, which may lead to a crash or memory corruption.
Apps that do not set a permission request handler, or whose handler responds synchronously, are not affected.
### Workarounds
Respond to permission requests synchronously, or deny fullscreen, pointer-lock, and keyboard-lock requests if an asynchronous flow is required.
### Fixed Versions
* `41.0.0-beta.8`
* `40.7.0`
* `39.8.0`
* `38.8.6`
### For more information
If there are any questions or comments about this advisory, please email [security@electronjs.org](mailto:security@electronjs.org) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34771 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02859 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0369 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03645 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03641 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04441 |
| published_at |
2026-05-05T12:55:00Z |
|
| 5 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11788 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11918 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11704 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12798 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12942 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12802 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12898 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.13018 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12978 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34771 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:npm/electron@39.8.0 |
| purl |
pkg:npm/electron@39.8.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2uv6-6zfm-x7c6 |
|
| 1 |
| vulnerability |
VCID-7yvz-624p-m7fe |
|
| 2 |
| vulnerability |
VCID-cjzy-nxnq-ffdp |
|
| 3 |
| vulnerability |
VCID-gxk8-9wc6-wkhs |
|
| 4 |
| vulnerability |
VCID-hynm-7wty-ruhq |
|
| 5 |
| vulnerability |
VCID-k7gj-cczw-wfeb |
|
| 6 |
| vulnerability |
VCID-ktbs-t8kb-5kch |
|
| 7 |
| vulnerability |
VCID-t1z9-bmnv-57bm |
|
| 8 |
| vulnerability |
VCID-ttvv-eca2-sfhu |
|
| 9 |
| vulnerability |
VCID-uwqv-4aqn-87fd |
|
| 10 |
| vulnerability |
VCID-vda9-xbsz-d7fm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/electron@39.8.0 |
|
| 2 |
|
| 3 |
|
|
| aliases |
CVE-2026-34771, GHSA-8337-3p73-46f4
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vp7h-hm4e-quaj |
|
|