Insufficient Verification of Data Authenticity Affecting electron package, versions <38.8.6>=39.0.0-alpha.1 <39.8.1>=40.0.0-alpha.2 <40.8.1>=41.0.0-alpha.1 <41.0.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-ELECTRON-15876436
  • published3 Apr 2026
  • disclosed3 Apr 2026
  • creditUnknown

Introduced: 3 Apr 2026

NewCVE-2026-34778  (opens in a new tab)
CWE-290  (opens in a new tab)
CWE-345  (opens in a new tab)

How to fix?

Upgrade electron to version 38.8.6, 39.8.1, 40.8.1, 41.0.0 or higher.

Overview

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Insufficient Verification of Data Authenticity via the webContents.executeJavaScript function. An attacker can manipulate the main-process promise to resolve with attacker-controlled data by spoofing reply messages on the internal IPC channel.

Note:

This is only exploitable if service workers are registered and the result of webContents.executeJavaScript() or webFrameMain.executeJavaScript() is used in security-sensitive decisions.

Workaround

This vulnerability can be mitigated by not trusting the return value of webContents.executeJavaScript() for security decisions and using dedicated, validated IPC channels for security-relevant communication with renderers.

CVSS Base Scores

version 4.0
version 3.1