Use of Password Hash With Insufficient Computational Effort Affecting electerm package, versions <3.9.5


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use of Password Hash With Insufficient Computational Effort vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-ELECTERM-16726192
  • published17 May 2026
  • disclosed14 May 2026
  • creditCurly-Haired-Baboon

Introduced: 14 May 2026

NewCVE-2026-45787  (opens in a new tab)
CWE-326  (opens in a new tab)
CWE-329  (opens in a new tab)
CWE-353  (opens in a new tab)
CWE-759  (opens in a new tab)
CWE-916  (opens in a new tab)

How to fix?

Upgrade electerm to version 3.9.5 or higher.

Overview

electerm is an open-sourced terminal/ssh/telnet/serialport/sftp client

Affected versions of this package are vulnerable to Use of Password Hash With Insufficient Computational Effort due to the encrypt process. An attacker can compromise the confidentiality and integrity of synced bookmark and profile data by exploiting deterministic encryption with a fixed zero IV, constant KDF salt, and lack of message authentication, allowing them to crack common passwords across installations and perform undetected ciphertext modifications.

CVSS Base Scores

version 4.0
version 3.1