Arbitrary Argument Injection Affecting electerm package, versions <3.7.9


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (9th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Argument Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-ELECTERM-16599142
  • published9 May 2026
  • disclosed8 May 2026
  • creditosageling

Introduced: 8 May 2026

NewCVE-2026-43943  (opens in a new tab)
CWE-78  (opens in a new tab)
CWE-88  (opens in a new tab)

How to fix?

Upgrade electerm to version 3.7.9 or higher.

Overview

electerm is an open-sourced terminal/ssh/telnet/serialport/sftp client

Affected versions of this package are vulnerable to Arbitrary Argument Injection via the openFileWithEditor process. An attacker can execute arbitrary commands on the user's system by crafting a malicious filename containing shell metacharacters, which are then passed unsanitized to the system editor when a user attempts to edit a file from an untrusted SSH server. This is only exploitable if the user opens files for editing from an attacker-controlled or compromised SSH server.

Workaround

This vulnerability can be mitigated by refraining from using the open with system editor or "Edit with custom editor" feature when connected to untrusted SSH servers, using the built-in editor for file viewing, or ensuring connections are only made to trusted servers and validating filenames before editing.

CVSS Base Scores

version 4.0
version 3.1