Improper Validation of Integrity Check Value Affecting org.webjars.npm:electron package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGWEBJARSNPM-10568624
  • published1 Jul 2025
  • disclosed1 Jul 2025
  • creditJust-Hack-For-Fun

Introduced: 1 Jul 2025

NewCVE-2024-46992  (opens in a new tab)
CWE-354  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

org.webjars.npm:electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Improper Validation of Integrity Check Value via the ASAR integrity validation process. An attacker can bypass integrity checks and modify application content by altering files within the application bundle on a filesystem to which they have write access.

Note: This is only exploitable if embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses are enabled and the application is launched from a writable filesystem on Windows.

References

CVSS Base Scores

version 4.0
version 3.1