8.3

CVE-2026-34780

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. From versions 39.0.0-alpha.1 to before 39.8.0, 40.0.0-alpha.1 to before 40.7.0, and 41.0.0-alpha.1 to before 41.0.0-beta.8, apps that pass VideoFrame objects (from the WebCodecs API) across the contextBridge are vulnerable to a context isolation bypass. An attacker who can execute JavaScript in the main world (for example, via XSS) can use a bridged VideoFrame to gain access to the isolated world, including any Node.js APIs exposed to the preload script. Apps are only affected if a preload script returns, resolves, or passes a VideoFrame object to the main world via contextBridge.exposeInMainWorld(). Apps that do not bridge VideoFrame objects are not affected. This issue has been patched in versions 39.8.0, 40.7.0, and 41.0.0-beta.8.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ElectronjsElectron SwPlatformnode.js Version >= 39.0.0 < 39.8.0
ElectronjsElectron SwPlatformnode.js Version >= 40.0.0 < 40.7.0
ElectronjsElectron Version41.0.0 Updatealpha1 SwPlatformnode.js
ElectronjsElectron Version41.0.0 Updatealpha2 SwPlatformnode.js
ElectronjsElectron Version41.0.0 Updatealpha3 SwPlatformnode.js
ElectronjsElectron Version41.0.0 Updatealpha4 SwPlatformnode.js
ElectronjsElectron Version41.0.0 Updatealpha5 SwPlatformnode.js
ElectronjsElectron Version41.0.0 Updatealpha6 SwPlatformnode.js
ElectronjsElectron Version41.0.0 Updatebeta1 SwPlatformnode.js
ElectronjsElectron Version41.0.0 Updatebeta2 SwPlatformnode.js
ElectronjsElectron Version41.0.0 Updatebeta3 SwPlatformnode.js
ElectronjsElectron Version41.0.0 Updatebeta4 SwPlatformnode.js
ElectronjsElectron Version41.0.0 Updatebeta5 SwPlatformnode.js
ElectronjsElectron Version41.0.0 Updatebeta6 SwPlatformnode.js
ElectronjsElectron Version41.0.0 Updatebeta7 SwPlatformnode.js
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.13
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.1 2.8 2.7
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
security-advisories@github.com 8.3 1.6 6
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
CWE-1188 Initialization of a Resource with an Insecure Default

The product initializes or sets a resource with a default that is intended to be changed by the administrator, but the default is not secure.

CWE-668 Exposure of Resource to Wrong Sphere

The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.