Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jfqx-fxh3-c62j | Electron: Unquoted executable path in app.setLoginItemSettings on Windows |
Thu, 09 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Electronjs
Electronjs electron |
|
| CPEs | cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha1:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha2:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha3:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha4:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha5:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha6:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta1:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta2:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta3:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta4:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta5:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta6:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta7:*:*:*:node.js:*:* |
|
| Vendors & Products |
Electronjs
Electronjs electron |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Electron
Electron electron |
|
| Vendors & Products |
Electron
Electron electron |
|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 06 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 04 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8, on Windows, app.setLoginItemSettings({openAtLogin: true}) wrote the executable path to the Run registry key without quoting. If the app is installed to a path containing spaces, an attacker with write access to an ancestor directory may be able to cause a different executable to run at login instead of the intended app. On a default Windows install, standard system directories are protected against writes by standard users, so exploitation typically requires a non-standard install location. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8. | |
| Title | Electron: Unquoted executable path in app.setLoginItemSettings on Windows | |
| Weaknesses | CWE-428 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-06T19:08:58.533Z
Reserved: 2026-03-30T19:54:55.555Z
Link: CVE-2026-34768
Updated: 2026-04-06T19:08:53.839Z
Status : Analyzed
Published: 2026-04-04T00:16:17.500
Modified: 2026-04-09T16:10:39.150
Link: CVE-2026-34768
OpenCVE Enrichment
Updated: 2026-04-10T09:45:27Z
Github GHSA