electron@18.0.0-alpha.1 vulnerabilities

Build cross platform desktop apps with JavaScript, HTML, and CSS

Direct Vulnerabilities

Known vulnerabilities in the electron package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Access Restriction Bypass

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Access Restriction Bypass due to an inappropriate implementation in the Extensions feature. An attacker can bypass site isolation.

How to fix Access Restriction Bypass?

Upgrade electron to version 31.7.5, 32.2.5, 33.2.1 or higher.

<31.7.5>=32.0.0-alpha.1 <32.2.5>=33.0.0 <33.2.1
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the Serial process. An attacker can potentially exploit heap corruption.

How to fix Use After Free?

Upgrade electron to version 31.7.5, 32.2.5 or higher.

<31.7.5>=32.0.0-alpha.1 <32.2.5
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Access of Resource Using Incompatible Type ('Type Confusion') via a crafted HTML page. An attacker can potentially exploit heap corruption.

How to fix Access of Resource Using Incompatible Type ('Type Confusion')?

Upgrade electron to version 32.2.3 or higher.

<32.2.3
  • H
Improper Access Control

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Improper Access Control due to an inappropriate implementation in Extensions. An attacker can bypass site isolation.

How to fix Improper Access Control?

Upgrade electron to version 31.7.4, 32.2.3 or higher.

<31.7.4>=32.0.0 <32.2.3
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Access of Resource Using Incompatible Type ('Type Confusion') via a crafted HTML page. An attacker can potentially exploit heap corruption.

How to fix Access of Resource Using Incompatible Type ('Type Confusion')?

Upgrade electron to version 31.7.4, 32.2.3 or higher.

<31.7.4>=32.0.0 <32.2.3
  • H
Out-of-bounds Write

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-bounds Write in Dawn.

How to fix Out-of-bounds Write?

Upgrade electron to version 31.7.4, 32.2.3 or higher.

<31.7.4>=32.0.0 <32.2.3
  • M
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow through the V8 engine.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 31.7.2 or higher.

<31.7.2
  • M
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow in Fonts.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 31.7.2 or higher.

<31.7.2
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow in Skia.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 31.7.2 or higher.

<31.7.2
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow in Skia.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 31.7.2 or higher.

<31.7.2
  • H
Type Confusion

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Type Confusion via the V8 engine.

How to fix Type Confusion?

Upgrade electron to version 31.7.2 or higher.

<31.7.2
  • C
Out-of-Bounds Write

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-Bounds Write via the V8 engine. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Out-of-Bounds Write?

Upgrade electron to version 31.7.2 or higher.

<31.7.2
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the WebAudio process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 31.7.2 or higher.

<31.7.2
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow in Skia

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 31.7.2 or higher.

<31.7.2
  • H
External Control of Assumed-Immutable Web Parameter

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to External Control of Assumed-Immutable Web Parameter via a crafted HTML page. An attacker can perform an out of bounds memory write by sending a specially crafted HTML content.

How to fix External Control of Assumed-Immutable Web Parameter?

Upgrade electron to version 31.7.2 or higher.

<31.7.2
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the Dawn component. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 31.7.2 or higher.

<31.7.2
  • M
Type Confusion

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Type Confusion. An attacker can access memory locations outside of the intended bounds by crafting a malicious HTML page that triggers type confusion in the V8 engine.

How to fix Type Confusion?

Upgrade electron to version 31.7.2 or higher.

<31.7.2
  • H
Out-of-bounds Read

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-bounds Read via a crafted HTML page. An attacker can access memory locations outside the intended boundary by crafting a malicious HTML page that triggers the flaw.

How to fix Out-of-bounds Read?

Upgrade electron to version 31.7.2 or higher.

<31.7.2
  • H
Out-of-bounds Read

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-bounds Read in Skia.

How to fix Out-of-bounds Read?

Upgrade electron to version 31.7.2, 32.2.2 or higher.

<31.7.2>=32.2.0 <32.2.2
  • C
Type Confusion

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Type Confusion via crafted HTML content.

How to fix Type Confusion?

Upgrade electron to version 31.7.1, 32.2.1 or higher.

<31.7.1>=32.2.0 <32.2.1
  • H
Type Confusion

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Type Confusion in InferHasInPrototypeChain of the V8 engine.

How to fix Type Confusion?

Upgrade electron to version 31.7.1, 32.2.1 or higher.

<31.7.1>=32.2.0 <32.2.1
  • H
Type Confusion

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Type Confusion in v8 engine.

How to fix Type Confusion?

A fix was pushed into the master branch but not yet published.

*
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free through the Media Stream process. An attacker can potentially exploit heap corruption by convincing a user to perform specific UI gestures on a crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.6, 30.4.0 or higher.

<29.4.6>=30.0.0 <30.4.0
  • H
Out-of-bounds Read

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-bounds Read via a crafted HTML page. An attacker can potentially perform a sandbox escape by manipulating the memory outside its intended buffer limits.

How to fix Out-of-bounds Read?

Upgrade electron to version 29.4.6, 30.4.0 or higher.

<29.4.6>=30.0.0 <30.4.0
  • H
Out-of-bounds Read

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-bounds Read through the V8 engine. An attacker can access memory locations outside of the intended bounds by crafting a malicious HTML page.

Note: This is only exploitable if the user navigates to or is redirected to a malicious web page.

How to fix Out-of-bounds Read?

Upgrade electron to version 29.4.6, 30.4.0 or higher.

<29.4.6>=30.0.0 <30.4.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via specific UI gestures in the Screen Capture feature. An attacker can potentially exploit heap corruption by convincing a user to visit a crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.6, 30.4.0 or higher.

<29.4.6>=30.0.0 <30.4.0
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow through the V8 engine. An attacker can corrupt memory and potentially execute arbitrary code by crafting a malicious HTML page.

Note: This is only exploitable if the user navigates to or is redirected to a malicious web page.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 29.4.6, 30.4.0 or higher.

<29.4.6>=30.0.0 <30.4.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the Navigation process. An attacker can exploit heap corruption by convincing a user to install a malicious extension.

How to fix Use After Free?

Upgrade electron to version 29.4.6, 30.4.0 or higher.

<29.4.6>=30.0.0 <30.4.0
  • M
Race Condition

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Race Condition via a crafted Chrome Extension. An attacker who convinced a user to install a malicious extension can inject scripts or HTML into a privileged page.

How to fix Race Condition?

Upgrade electron to version 29.4.6, 30.4.0 or higher.

<29.4.6>=30.0.0 <30.4.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free through the Audio process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.6, 30.4.0 or higher.

<29.4.6>=30.0.0 <30.4.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in Loader component. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 30.4.0, 31.4.0 or higher.

<30.4.0>=31.0.0 <31.4.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in Dawn component. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 30.4.0, 31.4.0 or higher.

<30.4.0>=31.0.0 <31.4.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free through the Dawn component. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.5, 30.2.0 or higher.

<29.4.5>=30.0.0 <30.2.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free due to the improper handling of memory in the Dawn component. An attacker can cause heap corruption and potentially execute arbitrary code by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.5, 30.2.0 or higher.

<29.4.5>=30.0.0 <30.2.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free through the Dawn process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.5, 30.2.0 or higher.

<29.4.5>=30.0.0 <30.2.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free through the Swiftshader process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.5, 30.2.0 or higher.

<29.4.5>=30.0.0 <30.2.0
  • M
Type Confusion

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Type Confusion via a crafted HTML page in the V8 engine.

**Note: ** This is only exploitable if the user navigates to or is redirected to the malicious page.

How to fix Type Confusion?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Out-of-bounds Read

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-bounds Read through the V8 engine. An attacker can access memory locations outside of the intended boundary by crafting a malicious HTML page.

How to fix Out-of-bounds Read?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the Dawn component.

How to fix Use After Free?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the Dawn process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

Note: 126.0.6478.56 is the fixed version for Windows and Mac. Version 126.0.6478.54 fixes the vulnerability in Linux

How to fix Use After Free?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free due to the improper handling of memory in the Dawn process. An attacker can cause heap corruption by crafting a malicious HTML page.

Note: 126.0.6478.56 is the fixed version for Windows and Mac. Version 126.0.6478.54 fixes the vulnerability in Linux

How to fix Use After Free?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow in the Dawn process. An attacker can perform an out of bounds memory write by exploiting a crafted HTML page.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow in the ANGLE process. An attacker can perform an out of bounds memory read via a crafted HTML page.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Type Confusion

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Type Confusion due to the V8 process. An attacker can potentially perform arbitrary read/write by exploiting a crafted HTML page.

How to fix Type Confusion?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in the scheduling process. An attacker can execute arbitrary code inside a sandbox by using a crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Out-of-Bounds Write

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-Bounds Write through the Streams API. An attacker can execute arbitrary code within a sandboxed environment by crafting a malicious HTML page.

How to fix Out-of-Bounds Write?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow through the WebRTC component. An attacker can cause heap corruption and potentially execute arbitrary code by crafting a malicious HTML page.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 29.4.3, 30.1.2 or higher.

<29.4.3>=30.0.0-alpha.1 <30.1.2
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free through the Dawn component. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free through the Dawn process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free through the Media Session process. An attacker can execute arbitrary code inside a sandbox by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow in vp8 encoding in libvpx.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 22.3.25, 24.8.5, 25.8.4, 26.2.4, 27.0.0-beta.8 or higher.

<22.3.25>=23.0.0 <24.8.5>=25.0.0 <25.8.4>=26.0.0 <26.2.4>=27.0.0-alpha.1 <27.0.0-beta.8
  • H
Out-of-bounds Read

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-bounds Read in WebRTC, exploitable via a crafted HTML page.

How to fix Out-of-bounds Read?

Upgrade electron to version 22.3.16 or higher.

<22.3.16
  • C
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the Mojo interface. An attacker can potentially exploit heap corruption by delivering a crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 27.3.3 or higher.

<27.3.3
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow via a crafted HTML page. An attacker can potentially exploit heap corruption by deceiving a user to visit a malicious web page.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 27.3.3 or higher.

<27.3.3
  • H
Privilege Context Switching Error

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Privilege Context Switching Error in libuv's handling of io_uring operations called before calling setuid(). This allows users to elevate privileges.

How to fix Privilege Context Switching Error?

Upgrade electron to version 29.4.0 or higher.

<29.4.0
  • H
Out-of-Bounds

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-Bounds memory access in V8 component. This vulnerability allowed a remote attacker to perform arbitrary read/write via a crafted HTML page.

How to fix Out-of-Bounds?

Upgrade electron to version 27.3.10, 28.3.0 or higher.

<27.3.10>=28.0.0 <28.3.0
  • M
Integer Overflow or Wraparound

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Integer Overflow or Wraparound when decoding videos with a large frame size. An attacker can cause memory corruption within the AV1 decoder by providing a specially crafted video file.

How to fix Integer Overflow or Wraparound?

Upgrade electron to version 27.3.11, 28.3.1 or higher.

<27.3.11>=28.0.0 <28.3.1
  • H
Out-of-bounds Write

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-bounds Write in the Compositing process. An attacker can potentially perform a sandbox escape by exploiting specific UI gestures. This is only exploitable if the attacker has already compromised the GPU process.

How to fix Out-of-bounds Write?

Upgrade electron to version 27.3.11, 28.3.1, 29.3.1 or higher.

<27.3.11>=28.0.0 <28.3.1>=29.0.0 <29.3.1
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow in the ANGLE component. An attacker can potentially exploit heap corruption through a crafted HTML page.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 27.3.11, 28.3.1, 29.3.1 or higher.

<27.3.11>=28.0.0 <28.3.1>=29.0.0 <29.3.1
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free due to improper handling of objects in memory in the Dawn component. An attacker can cause heap corruption and potentially execute arbitrary code by convincing a user to visit a specially crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 27.3.11, 28.3.1, 29.3.1 or higher.

<27.3.11>=28.0.0 <28.3.1>=29.0.0 <29.3.1
  • H
Improper Restriction of Operations within the Bounds of a Memory Buffer

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Improper Restriction of Operations within the Bounds of a Memory Buffer due to an inappropriate implementation in the V8 engine. An attacker can potentially perform out of bounds memory access by crafting a malicious HTML page.

How to fix Improper Restriction of Operations within the Bounds of a Memory Buffer?

Upgrade electron to version 29.3.0 or higher.

<29.3.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free due to improper handling in the WebCodecs component. An attacker can achieve arbitrary read/write access by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 27.3.9, 28.2.10, 29.2.0 or higher.

<27.3.9>=28.0.0-alpha.1 <28.2.10>=29.0.0-alpha.1 <29.2.0
  • C
Type Confusion

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Type Confusion due to a flaw in the WebAssembly component. An attacker can execute arbitrary code on the victim's machine by convincing them to visit a maliciously crafted HTML page.

How to fix Type Confusion?

Upgrade electron to version 27.3.9, 28.2.10, 29.2.0 or higher.

<27.3.9>=28.0.0-alpha.1 <28.2.10>=29.0.0-alpha.1 <29.2.0
  • C
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free due to improper handling of objects in memory in the ANGLE graphics engine. An attacker can cause heap corruption and potentially execute arbitrary code by convincing a user to visit a specially crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 27.3.9, 28.2.10, 29.2.0 or higher.

<27.3.9>=28.0.0-alpha.1 <28.2.10>=29.0.0-alpha.1 <29.2.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free due to the improper handling of objects in memory in the Dawn component. An attacker can potentially exploit heap corruption through a crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 27.3.9, 28.2.10, 29.2.0 or higher.

<27.3.9>=28.0.0-alpha.1 <28.2.10>=29.0.0-alpha.1 <29.2.0
  • H
NULL Pointer Dereference

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to NULL Pointer Dereference in V8, due to an object lifecycle issue involving scope inheritance.

How to fix NULL Pointer Dereference?

Upgrade electron to version 27.3.8, 28.2.9, 29.1.6 or higher.

<27.3.8>=28.0.0 <28.2.9>=29.0.0 <29.1.6
  • H
Denial of Service (DoS)

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Denial of Service (DoS) via an Out of bounds memory access in V8.

How to fix Denial of Service (DoS)?

Upgrade electron to version 27.3.6, 28.2.7, 29.1.2 or higher.

<27.3.6>=28.0.0-alpha.1 <28.2.7>=29.0.0-alpha.1 <29.1.2
  • M
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the xmlTextReader module. An attacker can cause denial of service by processing crafted XML documents with DTD validation and XInclude expansion enabled.

How to fix Use After Free?

Upgrade electron to version 27.3.5, 28.2.6 or higher.

<27.3.5>=28.0.0 <28.2.6
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in Mojo runtime libraries collection. This allows an attacker to exploit heap corruption via a crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 27.3.4, 28.2.5 or higher.

<27.3.4>=28.0.0 <28.2.5
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the Web Audio feature. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 26.6.8, 27.3.1 or higher.

<26.6.8>=27.0.0 <27.3.1
  • H
Out-of-bounds Read

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-bounds Read allowing a remote attacker to exploit heap corruption via a crafted HTML page.

Note: The Stable channel has been updated to 120.0.6099.234 for Mac devices.

How to fix Out-of-bounds Read?

Upgrade electron to version 26.6.7 or higher.

<26.6.7
  • H
Out-of-bounds Write

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-bounds Write allowing a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Note: The Stable channel has been updated to 120.0.6099.234 for Mac devices.

How to fix Out-of-bounds Write?

Upgrade electron to version 26.6.6, 27.2.3, 28.1.4 or higher.

<26.6.6>=27.0.0 <27.2.3>=28.0.0 <28.1.4
  • H
Type Confusion

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Type Confusion due to a type confusion in V8. A remote attacker could exploit heap corruption via a crafted HTML page.

Note: The Stable channel has been updated to 120.0.6099.234 for Mac devices.

How to fix Type Confusion?

Upgrade electron to version 26.6.6, 27.2.3, 28.1.4 or higher.

<26.6.6>=27.0.0 <27.2.3>=28.0.0 <28.1.4
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the WebGPU process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 26.6.5, 27.2.2 or higher.

<26.6.5>=27.0.0 <27.2.2
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow in the ANGLE component.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 26.6.5, 27.2.2 or higher.

<26.6.5>=27.0.0 <27.2.2
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the ANGLE component. An attacker can potentially exploit heap corruption by convincing a user to visit a crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 26.6.5, 27.2.2 or higher.

<26.6.5>=27.0.0 <27.2.2
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the WebAudio component. An attacker can potentially exploit heap corruption by convincing a user to visit a crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 26.6.5, 27.2.2 or higher.

<26.6.5>=27.0.0 <27.2.2
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow in the WebRTC framework, used to provide Real-Time Communications (RTC) capabilities via JavaScript APIs.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 26.6.3, 27.2.0, 28.1.0 or higher.

<26.6.3>=27.0.0 <27.2.0>=28.0.0 <28.1.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the Media Stream process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 26.6.3, 27.2.0 or higher.

<26.6.3>=27.0.0 <27.2.0
  • M
Insufficient Verification of Data Authenticity

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Insufficient Verification of Data Authenticity when the embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses are enabled.

An attacker can edit files inside the .app bundle on macOS, which these fuses are supposed to protect against, by gaining write access to the filesystem from which the app is launched.

Note

This is only exploitable if your app is launched from a filesystem the attacker has write access to and is specific to macOS, as these fuses are only supported on macOS.

How to fix Insufficient Verification of Data Authenticity?

Upgrade electron to version 22.3.24, 24.8.3, 25.8.1, 26.2.1 or higher.

<22.3.24>=24.0.0-alpha.1 <24.8.3>=25.0.0-alpha.1 <25.8.1>=26.0.0-alpha.1 <26.2.1
  • H
Integer Overflow or Wraparound

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Integer Overflow or Wraparound in the USB component.

How to fix Integer Overflow or Wraparound?

Upgrade electron to version 25.9.4, 26.5.0, 27.0.4 or higher.

<25.9.4>=26.0.0-alpha.1 <26.5.0>=27.0.0-alpha.1 <27.0.4
  • H
Improper Input Validation

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Improper Input Validation in the USB component.

How to fix Improper Input Validation?

Upgrade electron to version 25.9.4, 26.5.0, 27.0.4 or higher.

<25.9.4>=26.0.0-alpha.1 <26.5.0>=27.0.0-alpha.1 <27.0.4
  • H
Improper Access Control

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Improper Access Control via nested unserializable return value when using contextIsolation and contextBridge are affected. Exploiting this vulnerability allows code running in the main world context in the renderer to reach into the isolated Electron context and perform privileged actions.

Note

This issue is exploitable under either of two conditions:

  1. If an API exposed to the main world via contextBridge can return an object or array that contains a JS object that cannot be serialized, such as a canvas rendering context. This would normally result in an Error: object could not be cloned exception being thrown.

  2. If an API exposed to the main world via contextBridge has a return value that throws a user-generated exception while being sent over the bridge, such as a dynamic getter property on an object that throws an error when being computed.

How to fix Improper Access Control?

Upgrade electron to version 23.2.3, 25.0.0-alpha.2 or higher.

<23.2.3>=24.0.0-alpha.1 <25.0.0-alpha.2
  • H
Out-of-Bounds

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-Bounds when the V8 engine processes a carefully crafted HTML page. An attacker can perform an out of bounds memory read, thereby potentially gaining unauthorized access to sensitive information.

How to fix Out-of-Bounds?

Upgrade electron to version 22.3.23, 24.8.2, 25.8.0 or higher.

<22.3.23>=23.0.0 <24.8.2>=25.0.0 <25.8.0
  • H
Out-of-bounds Read

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-bounds Read in GPU Video in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

How to fix Out-of-bounds Read?

Upgrade electron to version 22.3.5 or higher.

<22.3.5
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow in Metrics by allowing a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 21.4.4, 22.3.5 or higher.

<21.4.4>=22.0.0 <22.3.5
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in WebRTC, causing heap corruption.

How to fix Use After Free?

Upgrade electron to version 20.3.12, 21.4.2 or higher.

<20.3.12>=21.0.0 <21.4.2
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow in Network Service via a crafted HTML page and specific interactions.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 20.3.10, 21.3.5 or higher.

<20.3.10>=21.0.0-alpha.1 <21.3.5
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in Mojo, via heap corruption.

How to fix Use After Free?

Upgrade electron to version 20.3.9, 21.4.0 or higher.

<20.3.9>=21.0.0 <21.4.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in WebCodecs, which allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 19.1.7, 20.3.7 or higher.

<19.1.7>=20.0.0 <20.3.7
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow in Crashpad in Google Chrome on Android, which allows a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 19.1.7, 20.3.7 or higher.

<19.1.7>=20.0.0 <20.3.7
  • H
Denial of Service (DoS)

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Denial of Service (DoS) due to type confusion in V8, which allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.

How to fix Denial of Service (DoS)?

Upgrade electron to version 19.1.7, 20.3.7 or higher.

<19.1.7>=20.0.0 <20.3.7
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in V8, which allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 19.1.7, 20.3.7 or higher.

<19.1.7>=20.0.0 <20.3.7
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the Web Workers, which allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 19.1.7, 20.3.7 or higher.

<19.1.7>=20.0.0 <20.3.7
  • M
Information Exposure

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Information Exposure in that it reveals hashed credentials when the target of a redirect is an SMB URL, such as one using the file:// scheme.

NOTE: This vulnerability is only exploitable on Windows.

How to fix Information Exposure?

Upgrade electron to version 18.3.7, 19.0.11, 20.0.1 or higher.

<18.3.7>=19.0.0-beta.1 <19.0.11>=20.0.0-beta.1 <20.0.1
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in Layout.

How to fix Use After Free?

Upgrade electron to version 19.1.5, 20.3.5 or higher.

<19.1.5>=20.0.0 <20.3.5
  • M
Improper Input Validation

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Improper Input Validation in file system.

How to fix Improper Input Validation?

Upgrade electron to version 19.1.5, 21.2.2 or higher.

<19.1.5>=20.0.0 <21.2.2
  • H
Type Confusion

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Type Confusion in V8.

How to fix Type Confusion?

Upgrade electron to version 19.1.5, 20.3.5 or higher.

<19.1.5>=20.0.0 <20.3.5
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in Frames, via a crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 18.3.14, 19.1.0 or higher.

<18.3.14>=19.0.0 <19.1.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in Network Service

How to fix Use After Free?

Upgrade electron to version 20.1.2, 19.1.0, 18.3.12 or higher.

>=20.0.0 <20.1.2>=19.0.0 <19.1.0<18.3.12
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in Layout.

How to fix Use After Free?

Upgrade electron to version 19.1.0, 18.3.14 or higher.

>=19.0.0 <19.1.0<18.3.14
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in WebSQL.

How to fix Use After Free?

Upgrade electron to version 18.3.12, 19.0.16, 20.1.2 or higher.

<18.3.12>=19.0.0 <19.0.16>=20.0.0 <20.1.2
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in WebSQL

How to fix Use After Free?

Upgrade electron to version 18.3.14, 20.1.4 or higher.

<18.3.14>=20.0.0 <20.1.4
  • H
Denial of Service (DoS)

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Denial of Service (DoS) due to insufficient validation of untrusted input in V8.

How to fix Denial of Service (DoS)?

Upgrade electron to version 18.3.14 or higher.

<18.3.14
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in SwiftShader.

How to fix Use After Free?

Upgrade electron to version 19.0.15 or higher.

<19.0.15
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in Blink, when a DisplayLock is unlocked via ForceUnlockIfNeeded.

How to fix Use After Free?

Upgrade electron to version 18.3.11 or higher.

<18.3.11
  • M
Improper Authentication

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Improper Authentication by allowing the creation of cookies that have an empty name field and whose value impersonates a cookie name prefix.

Note:

Upgrading to the fixed version will delete any previously stored cookies that meet the conditions by causing them to fail their IsCanonical() check.

How to fix Improper Authentication?

Upgrade electron to version 18.3.11 or higher.

<18.3.11
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free when glBufferData redefines a buffer and the new buffer is smaller than the old buffer.

How to fix Use After Free?

Upgrade electron to version 18.3.11, 19.0.15 or higher.

<18.3.11>=19.0.0 <19.0.15
  • M
Access Control Bypass

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Access Control Bypass due to insufficient policy enforcement in Cookies.

How to fix Access Control Bypass?

Upgrade electron to version 18.3.9, 19.0.12 or higher.

<18.3.9>=19.0.0 <19.0.12
  • M
Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Buffer Overflow when changing the PDF layout confuses AddFindResult() and causes it to fail a DCHECK()

How to fix Buffer Overflow?

Upgrade electron to version 18.3.8, 19.0.13 or higher.

<18.3.8>=19.0.0 <19.0.13
  • M
Improper Input Validation

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Improper Input Validation. in Internals, due to not treating % as a special character in pathname resolution.

NOTE: This vulnerability is only exploitable when running on Windows.

How to fix Improper Input Validation?

Upgrade electron to version 18.3.8, 19.0.13 or higher.

<18.3.8>=19.0.0 <19.0.13
  • M
Information Exposure

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Information Exposure in Background Fetch, by exposing URLs during cross-origin redirects.

How to fix Information Exposure?

Upgrade electron to version 18.3.9, 19.0.12 or higher.

<18.3.9>=19.0.0 <19.0.12