Improper Validation of Integrity Check Value Affecting electron package, versions >=30.0.0-alpha.1 <30.0.5>=31.0.0-alpha.1 <31.0.0-beta.1


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-ELECTRON-10568623
  • published1 Jul 2025
  • disclosed1 Jul 2025
  • creditJust-Hack-For-Fun

Introduced: 1 Jul 2025

NewCVE-2024-46992  (opens in a new tab)
CWE-354  (opens in a new tab)

How to fix?

Upgrade electron to version 30.0.5, 31.0.0-beta.1 or higher.

Overview

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Improper Validation of Integrity Check Value via the ASAR integrity validation process. An attacker can bypass integrity checks and modify application content by altering files within the application bundle on a filesystem to which they have write access.

Note: This is only exploitable if embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses are enabled and the application is launched from a writable filesystem on Windows.

References

CVSS Base Scores

version 4.0
version 3.1