Unsafe Dependency Resolution Affecting electerm package, versions <3.7.16


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (14th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Unsafe Dependency Resolution vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-ELECTERM-16599145
  • published9 May 2026
  • disclosed8 May 2026
  • creditosageling

Introduced: 8 May 2026

NewCVE-2026-43940  (opens in a new tab)
CWE-22  (opens in a new tab)
CWE-829  (opens in a new tab)

How to fix?

Upgrade electerm to version 3.7.16 or higher.

Overview

electerm is an open-sourced terminal/ssh/telnet/serialport/sftp client

Affected versions of this package are vulnerable to Unsafe Dependency Resolution via the runWidget function. An attacker can achieve arbitrary code execution by supplying crafted input that exploits path traversal to load and execute malicious JavaScript files from the filesystem through the renderer process. This is only exploitable if an attacker is able to execute JavaScript in the renderer process, such as through a malicious plugin or a cross-site scripting flaw in the embedded webview.

Workaround

This vulnerability can be mitigated by avoiding the installation or execution of untrusted plugins, refraining from loading arbitrary web content in the embedded webview, and running the application in a sandboxed environment to limit the impact of code execution.

CVSS Base Scores

version 4.0
version 3.1