Improper Input Validation Affecting electron package, versions <13.6.8>=14.0.0 <14.2.4>=15.0.0 <15.3.5


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.1% (44th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Input Validation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-ELECTRON-2332173
  • published6 Feb 2022
  • disclosed11 Jan 2022
  • creditSergei Glazunov

Introduced: 11 Jan 2022

CVE-2021-4098  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade electron to version 13.6.8, 14.2.4, 15.3.5 or higher.

Overview

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Improper Input Validation via Mojo. If the endpoint's task runner does not match the current task runner (or an equivalent main-thread task runner for the ChannelProxy) when executing a message dispatch task for that endpoint, it dispatches it on the wrong sequence.

CVSS Scores

version 3.1