Search for vulnerabilities
Vulnerability details: VCID-zk1q-g5wr-aaaq
Vulnerability ID VCID-zk1q-g5wr-aaaq
Aliases CVE-2018-15685
GHSA-hv9c-qwqg-qj3v
Summary Insecure Default Initialization of Resource GitHub Electron is affected by a `WebPreferences` vulnerability that can be leveraged to perform remote code execution.
Status Published
Exploitability 2.0
Weighted Severity 8.8
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.02260 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.02260 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.02260 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.02260 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.02383 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.02383 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.02383 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.02383 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.02383 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.03846 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.03846 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.03846 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.03846 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.03846 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.13253 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
epss 0.25904 https://api.first.org/data/v1/epss?cve=CVE-2018-15685
cvssv3 9.8 https://electronjs.org/blog/web-preferences-fix
cvssv3.1 8.1 https://electronjs.org/blog/web-preferences-fix
generic_textual HIGH https://electronjs.org/blog/web-preferences-fix
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-hv9c-qwqg-qj3v
cvssv3.1 8.8 https://github.com/electron/electron
generic_textual HIGH https://github.com/electron/electron
cvssv3.1 8.1 https://github.com/electron/electron/commit/519a02d8d4d28e8a467acb40fb26172a80c9454f
generic_textual HIGH https://github.com/electron/electron/commit/519a02d8d4d28e8a467acb40fb26172a80c9454f
cvssv3.1 8.1 https://github.com/electron/electron/commit/80221e52d93a96ea704cb6748ead669c55cff504
generic_textual HIGH https://github.com/electron/electron/commit/80221e52d93a96ea704cb6748ead669c55cff504
cvssv3.1 8.1 https://github.com/electron/electron/commit/bab968ca776be28791e4dddfd50c86bd5fae62fa
generic_textual HIGH https://github.com/electron/electron/commit/bab968ca776be28791e4dddfd50c86bd5fae62fa
cvssv3.1 8.1 https://github.com/electron/electron/commit/ef0a6d9a1c96efc4657c6dd3a6624eba969f095b
generic_textual HIGH https://github.com/electron/electron/commit/ef0a6d9a1c96efc4657c6dd3a6624eba969f095b
cvssv3 9.8 https://github.com/nodejs/security-wg/blob/main/vuln/npm/466.json
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2018-15685
cvssv3 8.1 https://nvd.nist.gov/vuln/detail/CVE-2018-15685
cvssv3.1 8.1 https://www.exploit-db.com/exploits/45272
generic_textual HIGH https://www.exploit-db.com/exploits/45272
cvssv3.1 8.1 https://www.npmjs.com/advisories/732
generic_textual HIGH https://www.npmjs.com/advisories/732
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2018-15685
https://electronjs.org/blog/web-preferences-fix
https://github.com/electron/electron
https://github.com/electron/electron/commit/519a02d8d4d28e8a467acb40fb26172a80c9454f
https://github.com/electron/electron/commit/80221e52d93a96ea704cb6748ead669c55cff504
https://github.com/electron/electron/commit/bab968ca776be28791e4dddfd50c86bd5fae62fa
https://github.com/electron/electron/commit/ef0a6d9a1c96efc4657c6dd3a6624eba969f095b
https://www.exploit-db.com/exploits/45272
https://www.exploit-db.com/exploits/45272/
https://www.npmjs.com/advisories/732
466 https://github.com/nodejs/security-wg/blob/main/vuln/npm/466.json
cpe:2.3:a:electronjs:electron:1.7.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:1.7.15:*:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:1.8.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:1.8.7:*:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:2.0.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:3.0.0:beta6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:3.0.0:beta6:*:*:*:*:*:*
CVE-2018-15685 Exploit https://github.com/matt-/CVE-2018-15685
CVE-2018-15685 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/45272.txt
CVE-2018-15685 https://nvd.nist.gov/vuln/detail/CVE-2018-15685
CVE-2018-15685 https://www.contrastsecurity.com/security-influencers/cve-2018-15685
GHSA-hv9c-qwqg-qj3v https://github.com/advisories/GHSA-hv9c-qwqg-qj3v
Data source Exploit-DB
Date added Aug. 27, 2018
Description Electron WebPreferences - Remote Code Execution
Ransomware campaign use Known
Source publication date Aug. 27, 2018
Exploit type remote
Platform multiple
Source update date Aug. 27, 2018
Source URL https://github.com/matt-/CVE-2018-15685
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://electronjs.org/blog/web-preferences-fix
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/electron/electron
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/electron/electron/commit/519a02d8d4d28e8a467acb40fb26172a80c9454f
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/electron/electron/commit/80221e52d93a96ea704cb6748ead669c55cff504
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/electron/electron/commit/bab968ca776be28791e4dddfd50c86bd5fae62fa
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/electron/electron/commit/ef0a6d9a1c96efc4657c6dd3a6624eba969f095b
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2018-15685
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2018-15685
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.exploit-db.com/exploits/45272
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.npmjs.com/advisories/732
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.89248
EPSS Score 0.02260
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.