Search for vulnerabilities
Vulnerability details: VCID-vbfq-zsr9-xyfy
Vulnerability ID VCID-vbfq-zsr9-xyfy
Aliases CVE-2022-29257
GHSA-77xc-hjv8-ww97
Summary AutoUpdater module fails to validate certain nested components of the bundle ### Impact This vulnerability allows attackers who have control over a given apps update server / update storage to serve maliciously crafted update packages that pass the code signing validation check but contain malicious code in some components. Please note that this kind of attack would require **significant** privileges in your own auto updating infrastructure and the ease of that attack entirely depends on your infrastructure security. ### Patches This has been patched and the following Electron versions contain the fix: * `18.0.0-beta.6` * `17.2.0` * `16.2.0` * `15.5.0` ### Workarounds There are no workarounds for this issue, please update to a patched version of Electron. ### For more information If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org)
Status Published
Exploitability 0.5
Weighted Severity 6.5
Risk 3.2
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-29257
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-77xc-hjv8-ww97
cvssv3.1 6.6 https://github.com/electron/electron
generic_textual MODERATE https://github.com/electron/electron
cvssv3.1 6.6 https://github.com/electron/electron/security/advisories/GHSA-77xc-hjv8-ww97
cvssv3.1_qr MODERATE https://github.com/electron/electron/security/advisories/GHSA-77xc-hjv8-ww97
generic_textual MODERATE https://github.com/electron/electron/security/advisories/GHSA-77xc-hjv8-ww97
ssvc Track https://github.com/electron/electron/security/advisories/GHSA-77xc-hjv8-ww97
cvssv2 6.5 https://nvd.nist.gov/vuln/detail/CVE-2022-29257
cvssv3.1 6.6 https://nvd.nist.gov/vuln/detail/CVE-2022-29257
cvssv3.1 7.2 https://nvd.nist.gov/vuln/detail/CVE-2022-29257
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2022-29257
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2022-29257
https://github.com/electron/electron
https://github.com/electron/electron/security/advisories/GHSA-77xc-hjv8-ww97
https://nvd.nist.gov/vuln/detail/CVE-2022-29257
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:16.0.0:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:16.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:16.0.0:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:16.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:16.0.0:beta3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:16.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:16.0.0:beta4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:16.0.0:beta4:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:16.0.0:beta5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:16.0.0:beta5:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:16.0.0:beta6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:16.0.0:beta6:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:16.0.0:beta7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:16.0.0:beta7:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:16.0.0:beta8:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:16.0.0:beta8:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:16.0.0:beta9:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:16.0.0:beta9:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:17.0.0:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:17.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:17.0.0:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:17.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:17.0.0:beta3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:17.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:17.0.0:beta4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:17.0.0:beta4:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:17.0.0:beta5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:17.0.0:beta5:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:17.0.0:beta6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:17.0.0:beta6:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:17.0.0:beta7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:17.0.0:beta7:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:17.0.0:beta8:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:17.0.0:beta8:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:17.0.0:beta9:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:17.0.0:beta9:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:18.0.0:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:18.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:18.0.0:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:18.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:18.0.0:beta3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:18.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:18.0.0:beta4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:18.0.0:beta4:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:18.0.0:beta5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:18.0.0:beta5:*:*:*:*:*:*
GHSA-77xc-hjv8-ww97 https://github.com/advisories/GHSA-77xc-hjv8-ww97
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/electron/electron
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/electron/electron/security/advisories/GHSA-77xc-hjv8-ww97
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:52:31Z/ Found at https://github.com/electron/electron/security/advisories/GHSA-77xc-hjv8-ww97
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2022-29257
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-29257
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-29257
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.60665
EPSS Score 0.00413
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T09:05:31.108490+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-77xc-hjv8-ww97/GHSA-77xc-hjv8-ww97.json 37.0.0