Search for vulnerabilities
Vulnerability details: VCID-2zn4-vrk9-1qhv
Vulnerability ID VCID-2zn4-vrk9-1qhv
Aliases CVE-2024-46993
GHSA-6r2x-8pq8-9489
Summary Electron vulnerable to Heap Buffer Overflow in NativeImage ### Impact The `nativeImage.createFromPath()` and `nativeImage.createFromBuffer()` functions call a function downstream that is vulnerable to a heap buffer overflow. An Electron program that uses either of the affected functions is vulnerable to a buffer overflow if an attacker is in control of the image's height, width, and contents. ### Workaround There are no app-side workarounds for this issue. You must update your Electron version to be protected. ### Patches - `v28.3.2` - `v29.3.3` - `v30.0.3` ### For More Information If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org).
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.00016 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00016 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00016 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2024-46993
cvssv3.1 7 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-6r2x-8pq8-9489
generic_textual MODERATE https://github.com/electron/electron
cvssv3.1_qr MODERATE https://github.com/electron/electron/security/advisories/GHSA-6r2x-8pq8-9489
cvssv4 4.4 https://github.com/electron/electron/security/advisories/GHSA-6r2x-8pq8-9489
generic_textual MODERATE https://github.com/electron/electron/security/advisories/GHSA-6r2x-8pq8-9489
ssvc Track https://github.com/electron/electron/security/advisories/GHSA-6r2x-8pq8-9489
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2024-46993
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U Found at https://github.com/electron/electron/security/advisories/GHSA-6r2x-8pq8-9489
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-01T13:45:02Z/ Found at https://github.com/electron/electron/security/advisories/GHSA-6r2x-8pq8-9489
Exploit Prediction Scoring System (EPSS)
Percentile 0.02144
EPSS Score 0.00016
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:39:10.391967+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-6r2x-8pq8-9489/GHSA-6r2x-8pq8-9489.json 37.0.0