7.8
CVE-2026-34779
- EPSS 0.03%
- Veröffentlicht 04.04.2026 00:00:41
- Zuletzt bearbeitet 14.04.2026 18:55:03
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8, on macOS, app.moveToApplicationsFolder() used an AppleScript fallback path that did not properly handle certain characters in the application bundle path. Under specific conditions, a crafted launch path could lead to arbitrary AppleScript execution when the user accepted the move-to-Applications prompt. Apps are only affected if they call app.moveToApplicationsFolder(). Apps that do not use this API are not affected. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Electronjs ≫ Electron SwPlatformnode.js Version < 38.8.6
Electronjs ≫ Electron SwPlatformnode.js Version >= 39.0.0 < 39.8.1
Electronjs ≫ Electron SwPlatformnode.js Version >= 40.0.0 < 40.8.0
Electronjs ≫ Electron Version41.0.0 Updatealpha1 SwPlatformnode.js
Electronjs ≫ Electron Version41.0.0 Updatealpha2 SwPlatformnode.js
Electronjs ≫ Electron Version41.0.0 Updatealpha3 SwPlatformnode.js
Electronjs ≫ Electron Version41.0.0 Updatealpha4 SwPlatformnode.js
Electronjs ≫ Electron Version41.0.0 Updatealpha5 SwPlatformnode.js
Electronjs ≫ Electron Version41.0.0 Updatealpha6 SwPlatformnode.js
Electronjs ≫ Electron Version41.0.0 Updatebeta1 SwPlatformnode.js
Electronjs ≫ Electron Version41.0.0 Updatebeta2 SwPlatformnode.js
Electronjs ≫ Electron Version41.0.0 Updatebeta3 SwPlatformnode.js
Electronjs ≫ Electron Version41.0.0 Updatebeta4 SwPlatformnode.js
Electronjs ≫ Electron Version41.0.0 Updatebeta5 SwPlatformnode.js
Electronjs ≫ Electron Version41.0.0 Updatebeta6 SwPlatformnode.js
Electronjs ≫ Electron Version41.0.0 Updatebeta7 SwPlatformnode.js
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.071 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
| security-advisories@github.com | 6.5 | 1 | 5.5 |
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.