Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-phbq-fatc-mbh2
Vulnerability ID VCID-phbq-fatc-mbh2
Aliases CVE-2026-34780
GHSA-jfqg-hf23-qpw2
Summary Electron: Context Isolation bypass via contextBridge VideoFrame transfer ### Impact Apps that pass `VideoFrame` objects (from the WebCodecs API) across the `contextBridge` are vulnerable to a context isolation bypass. An attacker who can execute JavaScript in the main world (for example, via XSS) can use a bridged `VideoFrame` to gain access to the isolated world, including any Node.js APIs exposed to the preload script. Apps are only affected if a preload script returns, resolves, or passes a `VideoFrame` object to the main world via `contextBridge.exposeInMainWorld()`. Apps that do not bridge `VideoFrame` objects are not affected. ### Workarounds Do not pass `VideoFrame` objects across `contextBridge`. If an app needs to transfer video frame data, serialize it to an `ArrayBuffer` or `ImageBitmap` before bridging. ### Fixed Versions * `41.0.0-beta.8` * `40.7.0` * `39.8.0` ### For more information If there are any questions or comments about this advisory, please email [security@electronjs.org](mailto:security@electronjs.org)
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (5)
System Score Found at
cvssv3 8.0 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34780.json
epss 0.00011 https://api.first.org/data/v1/epss?cve=CVE-2026-34780
epss 0.00011 https://api.first.org/data/v1/epss?cve=CVE-2026-34780
epss 0.00011 https://api.first.org/data/v1/epss?cve=CVE-2026-34780
epss 0.00011 https://api.first.org/data/v1/epss?cve=CVE-2026-34780
epss 0.00035 https://api.first.org/data/v1/epss?cve=CVE-2026-34780
epss 0.00035 https://api.first.org/data/v1/epss?cve=CVE-2026-34780
epss 0.00039 https://api.first.org/data/v1/epss?cve=CVE-2026-34780
epss 0.00039 https://api.first.org/data/v1/epss?cve=CVE-2026-34780
epss 0.00039 https://api.first.org/data/v1/epss?cve=CVE-2026-34780
epss 0.00039 https://api.first.org/data/v1/epss?cve=CVE-2026-34780
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2026-34780
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2026-34780
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2026-34780
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-jfqg-hf23-qpw2
cvssv3.1 8.3 https://github.com/electron/electron
generic_textual HIGH https://github.com/electron/electron
cvssv3.1 8.3 https://github.com/electron/electron/security/advisories/GHSA-jfqg-hf23-qpw2
cvssv3.1 8.4 https://github.com/electron/electron/security/advisories/GHSA-jfqg-hf23-qpw2
cvssv3.1_qr HIGH https://github.com/electron/electron/security/advisories/GHSA-jfqg-hf23-qpw2
generic_textual HIGH https://github.com/electron/electron/security/advisories/GHSA-jfqg-hf23-qpw2
ssvc Track https://github.com/electron/electron/security/advisories/GHSA-jfqg-hf23-qpw2
cvssv3.1 8.3 https://nvd.nist.gov/vuln/detail/CVE-2026-34780
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2026-34780
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34780.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Found at https://github.com/electron/electron
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Found at https://github.com/electron/electron/security/advisories/GHSA-jfqg-hf23-qpw2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Found at https://github.com/electron/electron/security/advisories/GHSA-jfqg-hf23-qpw2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-06T15:49:13Z/ Found at https://github.com/electron/electron/security/advisories/GHSA-jfqg-hf23-qpw2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2026-34780
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.0149
EPSS Score 0.00011
Published At April 21, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-03T21:42:22.027182+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-jfqg-hf23-qpw2/GHSA-jfqg-hf23-qpw2.json 38.1.0