Information Exposure Affecting electron/electron package, versions [9.0.0,9.4.0)[10.0.0,10.2.0)[11.0.0,11.1.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.13% (49th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ELECTRONELECTRON-2370570
  • published26 Jan 2022
  • disclosed28 Jan 2021
  • creditUnknown

Introduced: 28 Jan 2021

CVE-2020-26272  (opens in a new tab)
CWE-668  (opens in a new tab)

How to fix?

Upgrade electron/electron to version 9.4.0, 10.2.0, 11.1.0 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure. The Electron framework lets you write cross-platform desktop applications using JavaScript, HTML and CSS. In affected versions of Electron IPC messages sent from the main process to a subframe in the renderer process, through webContents.sendToFrame, event.reply or when using the remote module, can in some cases be delivered to the wrong frame. If your app uses remote, calls webContents.sendToFrame, or calls event.reply in an IPC message handler then it is impacted by this issue. This has been fixed in versions 9.4.0, 10.2.0, 11.1.0, and 12.0.0-beta.9. There are no workarounds for this issue.

CVSS Scores

version 3.1