electron@19.1.9 vulnerabilities

Build cross platform desktop apps with JavaScript, HTML, and CSS

Direct Vulnerabilities

Known vulnerabilities in the electron package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free through the Media Stream process. An attacker can potentially exploit heap corruption by convincing a user to perform specific UI gestures on a crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.6, 30.4.0 or higher.

<29.4.6 >=30.0.0 <30.4.0
  • H
Out-of-bounds Read

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-bounds Read via a crafted HTML page. An attacker can potentially perform a sandbox escape by manipulating the memory outside its intended buffer limits.

How to fix Out-of-bounds Read?

Upgrade electron to version 29.4.6, 30.4.0 or higher.

<29.4.6 >=30.0.0 <30.4.0
  • H
Out-of-bounds Read

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-bounds Read through the V8 engine. An attacker can access memory locations outside of the intended bounds by crafting a malicious HTML page.

Note: This is only exploitable if the user navigates to or is redirected to a malicious web page.

How to fix Out-of-bounds Read?

Upgrade electron to version 29.4.6, 30.4.0 or higher.

<29.4.6 >=30.0.0 <30.4.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via specific UI gestures in the Screen Capture feature. An attacker can potentially exploit heap corruption by convincing a user to visit a crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.6, 30.4.0 or higher.

<29.4.6 >=30.0.0 <30.4.0
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow through the V8 engine. An attacker can corrupt memory and potentially execute arbitrary code by crafting a malicious HTML page.

Note: This is only exploitable if the user navigates to or is redirected to a malicious web page.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 29.4.6, 30.4.0 or higher.

<29.4.6 >=30.0.0 <30.4.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the Navigation process. An attacker can exploit heap corruption by convincing a user to install a malicious extension.

How to fix Use After Free?

Upgrade electron to version 29.4.6, 30.4.0 or higher.

<29.4.6 >=30.0.0 <30.4.0
  • M
Race Condition

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Race Condition via a crafted Chrome Extension. An attacker who convinced a user to install a malicious extension can inject scripts or HTML into a privileged page.

How to fix Race Condition?

Upgrade electron to version 29.4.6, 30.4.0 or higher.

<29.4.6 >=30.0.0 <30.4.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free through the Audio process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.6, 30.4.0 or higher.

<29.4.6 >=30.0.0 <30.4.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in Loader component. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 30.4.0, 31.4.0 or higher.

<30.4.0 >=31.0.0 <31.4.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in Dawn component. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 30.4.0, 31.4.0 or higher.

<30.4.0 >=31.0.0 <31.4.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free through the Dawn component. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.5, 30.2.0 or higher.

<29.4.5 >=30.0.0 <30.2.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free due to the improper handling of memory in the Dawn component. An attacker can cause heap corruption and potentially execute arbitrary code by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.5, 30.2.0 or higher.

<29.4.5 >=30.0.0 <30.2.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free through the Dawn process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.5, 30.2.0 or higher.

<29.4.5 >=30.0.0 <30.2.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free through the Swiftshader process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.5, 30.2.0 or higher.

<29.4.5 >=30.0.0 <30.2.0
  • M
Type Confusion

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Type Confusion via a crafted HTML page in the V8 engine.

**Note: ** This is only exploitable if the user navigates to or is redirected to the malicious page.

How to fix Type Confusion?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Out-of-bounds Read

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-bounds Read through the V8 engine. An attacker can access memory locations outside of the intended boundary by crafting a malicious HTML page.

How to fix Out-of-bounds Read?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the Dawn component.

How to fix Use After Free?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the Dawn process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

Note: 126.0.6478.56 is the fixed version for Windows and Mac. Version 126.0.6478.54 fixes the vulnerability in Linux

How to fix Use After Free?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free due to the improper handling of memory in the Dawn process. An attacker can cause heap corruption by crafting a malicious HTML page.

Note: 126.0.6478.56 is the fixed version for Windows and Mac. Version 126.0.6478.54 fixes the vulnerability in Linux

How to fix Use After Free?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow in the Dawn process. An attacker can perform an out of bounds memory write by exploiting a crafted HTML page.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow in the ANGLE process. An attacker can perform an out of bounds memory read via a crafted HTML page.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Type Confusion

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Type Confusion due to the V8 process. An attacker can potentially perform arbitrary read/write by exploiting a crafted HTML page.

How to fix Type Confusion?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in the scheduling process. An attacker can execute arbitrary code inside a sandbox by using a crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Out-of-Bounds Write

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-Bounds Write through the Streams API. An attacker can execute arbitrary code within a sandboxed environment by crafting a malicious HTML page.

How to fix Out-of-Bounds Write?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow through the WebRTC component. An attacker can cause heap corruption and potentially execute arbitrary code by crafting a malicious HTML page.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 29.4.3, 30.1.2 or higher.

<29.4.3 >=30.0.0-alpha.1 <30.1.2
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free through the Dawn component. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free through the Dawn process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free through the Media Session process. An attacker can execute arbitrary code inside a sandbox by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 29.4.3 or higher.

<29.4.3
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow in vp8 encoding in libvpx.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 22.3.25, 24.8.5, 25.8.4, 26.2.4, 27.0.0-beta.8 or higher.

<22.3.25 >=23.0.0 <24.8.5 >=25.0.0 <25.8.4 >=26.0.0 <26.2.4 >=27.0.0-alpha.1 <27.0.0-beta.8
  • H
Out-of-bounds Read

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-bounds Read in WebRTC, exploitable via a crafted HTML page.

How to fix Out-of-bounds Read?

Upgrade electron to version 22.3.16 or higher.

<22.3.16
  • C
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the Mojo interface. An attacker can potentially exploit heap corruption by delivering a crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 27.3.3 or higher.

<27.3.3
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow via a crafted HTML page. An attacker can potentially exploit heap corruption by deceiving a user to visit a malicious web page.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 27.3.3 or higher.

<27.3.3
  • H
Privilege Context Switching Error

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Privilege Context Switching Error in libuv's handling of io_uring operations called before calling setuid(). This allows users to elevate privileges.

How to fix Privilege Context Switching Error?

Upgrade electron to version 29.4.0 or higher.

<29.4.0
  • H
Out-of-Bounds

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-Bounds memory access in V8 component. This vulnerability allowed a remote attacker to perform arbitrary read/write via a crafted HTML page.

How to fix Out-of-Bounds?

Upgrade electron to version 27.3.10, 28.3.0 or higher.

<27.3.10 >=28.0.0 <28.3.0
  • M
Integer Overflow or Wraparound

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Integer Overflow or Wraparound when decoding videos with a large frame size. An attacker can cause memory corruption within the AV1 decoder by providing a specially crafted video file.

How to fix Integer Overflow or Wraparound?

Upgrade electron to version 27.3.11, 28.3.1 or higher.

<27.3.11 >=28.0.0 <28.3.1
  • H
Out-of-bounds Write

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-bounds Write in the Compositing process. An attacker can potentially perform a sandbox escape by exploiting specific UI gestures. This is only exploitable if the attacker has already compromised the GPU process.

How to fix Out-of-bounds Write?

Upgrade electron to version 27.3.11, 28.3.1, 29.3.1 or higher.

<27.3.11 >=28.0.0 <28.3.1 >=29.0.0 <29.3.1
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow in the ANGLE component. An attacker can potentially exploit heap corruption through a crafted HTML page.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 27.3.11, 28.3.1, 29.3.1 or higher.

<27.3.11 >=28.0.0 <28.3.1 >=29.0.0 <29.3.1
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free due to improper handling of objects in memory in the Dawn component. An attacker can cause heap corruption and potentially execute arbitrary code by convincing a user to visit a specially crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 27.3.11, 28.3.1, 29.3.1 or higher.

<27.3.11 >=28.0.0 <28.3.1 >=29.0.0 <29.3.1
  • H
Improper Restriction of Operations within the Bounds of a Memory Buffer

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Improper Restriction of Operations within the Bounds of a Memory Buffer due to an inappropriate implementation in the V8 engine. An attacker can potentially perform out of bounds memory access by crafting a malicious HTML page.

How to fix Improper Restriction of Operations within the Bounds of a Memory Buffer?

Upgrade electron to version 29.3.0 or higher.

<29.3.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free due to improper handling in the WebCodecs component. An attacker can achieve arbitrary read/write access by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 27.3.9, 28.2.10, 29.2.0 or higher.

<27.3.9 >=28.0.0-alpha.1 <28.2.10 >=29.0.0-alpha.1 <29.2.0
  • C
Type Confusion

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Type Confusion due to a flaw in the WebAssembly component. An attacker can execute arbitrary code on the victim's machine by convincing them to visit a maliciously crafted HTML page.

How to fix Type Confusion?

Upgrade electron to version 27.3.9, 28.2.10, 29.2.0 or higher.

<27.3.9 >=28.0.0-alpha.1 <28.2.10 >=29.0.0-alpha.1 <29.2.0
  • C
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free due to improper handling of objects in memory in the ANGLE graphics engine. An attacker can cause heap corruption and potentially execute arbitrary code by convincing a user to visit a specially crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 27.3.9, 28.2.10, 29.2.0 or higher.

<27.3.9 >=28.0.0-alpha.1 <28.2.10 >=29.0.0-alpha.1 <29.2.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free due to the improper handling of objects in memory in the Dawn component. An attacker can potentially exploit heap corruption through a crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 27.3.9, 28.2.10, 29.2.0 or higher.

<27.3.9 >=28.0.0-alpha.1 <28.2.10 >=29.0.0-alpha.1 <29.2.0
  • H
NULL Pointer Dereference

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to NULL Pointer Dereference in V8, due to an object lifecycle issue involving scope inheritance.

How to fix NULL Pointer Dereference?

Upgrade electron to version 27.3.8, 28.2.9, 29.1.6 or higher.

<27.3.8 >=28.0.0 <28.2.9 >=29.0.0 <29.1.6
  • H
Denial of Service (DoS)

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Denial of Service (DoS) via an Out of bounds memory access in V8.

How to fix Denial of Service (DoS)?

Upgrade electron to version 27.3.6, 28.2.7, 29.1.2 or higher.

<27.3.6 >=28.0.0-alpha.1 <28.2.7 >=29.0.0-alpha.1 <29.1.2
  • M
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the xmlTextReader module. An attacker can cause denial of service by processing crafted XML documents with DTD validation and XInclude expansion enabled.

How to fix Use After Free?

Upgrade electron to version 27.3.5, 28.2.6 or higher.

<27.3.5 >=28.0.0 <28.2.6
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in Mojo runtime libraries collection. This allows an attacker to exploit heap corruption via a crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 27.3.4, 28.2.5 or higher.

<27.3.4 >=28.0.0 <28.2.5
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the Web Audio feature. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 26.6.8, 27.3.1 or higher.

<26.6.8 >=27.0.0 <27.3.1
  • H
Out-of-bounds Read

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-bounds Read allowing a remote attacker to exploit heap corruption via a crafted HTML page.

Note: The Stable channel has been updated to 120.0.6099.234 for Mac devices.

How to fix Out-of-bounds Read?

Upgrade electron to version 26.6.7 or higher.

<26.6.7
  • H
Out-of-bounds Write

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-bounds Write allowing a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Note: The Stable channel has been updated to 120.0.6099.234 for Mac devices.

How to fix Out-of-bounds Write?

Upgrade electron to version 26.6.6, 27.2.3, 28.1.4 or higher.

<26.6.6 >=27.0.0 <27.2.3 >=28.0.0 <28.1.4
  • H
Type Confusion

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Type Confusion due to a type confusion in V8. A remote attacker could exploit heap corruption via a crafted HTML page.

Note: The Stable channel has been updated to 120.0.6099.234 for Mac devices.

How to fix Type Confusion?

Upgrade electron to version 26.6.6, 27.2.3, 28.1.4 or higher.

<26.6.6 >=27.0.0 <27.2.3 >=28.0.0 <28.1.4
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the WebGPU process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 26.6.5, 27.2.2 or higher.

<26.6.5 >=27.0.0 <27.2.2
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow in the ANGLE component.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 26.6.5, 27.2.2 or higher.

<26.6.5 >=27.0.0 <27.2.2
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the ANGLE component. An attacker can potentially exploit heap corruption by convincing a user to visit a crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 26.6.5, 27.2.2 or higher.

<26.6.5 >=27.0.0 <27.2.2
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the WebAudio component. An attacker can potentially exploit heap corruption by convincing a user to visit a crafted HTML page.

How to fix Use After Free?

Upgrade electron to version 26.6.5, 27.2.2 or higher.

<26.6.5 >=27.0.0 <27.2.2
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow in the WebRTC framework, used to provide Real-Time Communications (RTC) capabilities via JavaScript APIs.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 26.6.3, 27.2.0, 28.1.0 or higher.

<26.6.3 >=27.0.0 <27.2.0 >=28.0.0 <28.1.0
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free via the Media Stream process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.

How to fix Use After Free?

Upgrade electron to version 26.6.3, 27.2.0 or higher.

<26.6.3 >=27.0.0 <27.2.0
  • M
Insufficient Verification of Data Authenticity

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Insufficient Verification of Data Authenticity when the embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses are enabled.

An attacker can edit files inside the .app bundle on macOS, which these fuses are supposed to protect against, by gaining write access to the filesystem from which the app is launched.

Note

This is only exploitable if your app is launched from a filesystem the attacker has write access to and is specific to macOS, as these fuses are only supported on macOS.

How to fix Insufficient Verification of Data Authenticity?

Upgrade electron to version 22.3.24, 24.8.3, 25.8.1, 26.2.1 or higher.

<22.3.24 >=24.0.0-alpha.1 <24.8.3 >=25.0.0-alpha.1 <25.8.1 >=26.0.0-alpha.1 <26.2.1
  • H
Integer Overflow or Wraparound

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Integer Overflow or Wraparound in the USB component.

How to fix Integer Overflow or Wraparound?

Upgrade electron to version 25.9.4, 26.5.0, 27.0.4 or higher.

<25.9.4 >=26.0.0-alpha.1 <26.5.0 >=27.0.0-alpha.1 <27.0.4
  • H
Improper Input Validation

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Improper Input Validation in the USB component.

How to fix Improper Input Validation?

Upgrade electron to version 25.9.4, 26.5.0, 27.0.4 or higher.

<25.9.4 >=26.0.0-alpha.1 <26.5.0 >=27.0.0-alpha.1 <27.0.4
  • H
Improper Access Control

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Improper Access Control via nested unserializable return value when using contextIsolation and contextBridge are affected. Exploiting this vulnerability allows code running in the main world context in the renderer to reach into the isolated Electron context and perform privileged actions.

Note

This issue is exploitable under either of two conditions:

  1. If an API exposed to the main world via contextBridge can return an object or array that contains a JS object that cannot be serialized, such as a canvas rendering context. This would normally result in an Error: object could not be cloned exception being thrown.

  2. If an API exposed to the main world via contextBridge has a return value that throws a user-generated exception while being sent over the bridge, such as a dynamic getter property on an object that throws an error when being computed.

How to fix Improper Access Control?

Upgrade electron to version 23.2.3, 25.0.0-alpha.2 or higher.

<23.2.3 >=24.0.0-alpha.1 <25.0.0-alpha.2
  • H
Out-of-Bounds

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-Bounds when the V8 engine processes a carefully crafted HTML page. An attacker can perform an out of bounds memory read, thereby potentially gaining unauthorized access to sensitive information.

How to fix Out-of-Bounds?

Upgrade electron to version 22.3.23, 24.8.2, 25.8.0 or higher.

<22.3.23 >=23.0.0 <24.8.2 >=25.0.0 <25.8.0
  • H
Out-of-bounds Read

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Out-of-bounds Read in GPU Video in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

How to fix Out-of-bounds Read?

Upgrade electron to version 22.3.5 or higher.

<22.3.5
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow in Metrics by allowing a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 21.4.4, 22.3.5 or higher.

<21.4.4 >=22.0.0 <22.3.5
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in WebRTC, causing heap corruption.

How to fix Use After Free?

Upgrade electron to version 20.3.12, 21.4.2 or higher.

<20.3.12 >=21.0.0 <21.4.2
  • H
Heap-based Buffer Overflow

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow in Network Service via a crafted HTML page and specific interactions.

How to fix Heap-based Buffer Overflow?

Upgrade electron to version 20.3.10, 21.3.5 or higher.

<20.3.10 >=21.0.0-alpha.1 <21.3.5
  • H
Use After Free

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Use After Free in Mojo, via heap corruption.

How to fix Use After Free?

Upgrade electron to version 20.3.9, 21.4.0 or higher.

<20.3.9 >=21.0.0 <21.4.0