Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jjp3-mq3x-295m | Electron: Use-after-free in PowerMonitor on Windows and macOS |
Wed, 22 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Electronjs
Electronjs electron |
|
| CPEs | cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha1:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha2:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha3:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha4:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha5:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha6:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta1:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta2:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta3:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta4:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta5:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta6:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta7:*:*:*:node.js:*:* |
|
| Vendors & Products |
Electronjs
Electronjs electron |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Electron
Electron electron |
|
| Vendors & Products |
Electron
Electron electron |
Mon, 06 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 04 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8, apps that use the powerMonitor module may be vulnerable to a use-after-free. After the native PowerMonitor object is garbage-collected, the associated OS-level resources (a message window on Windows, a shutdown handler on macOS) retain dangling references. A subsequent session-change event (Windows) or system shutdown (macOS) dereferences freed memory, which may lead to a crash or memory corruption. All apps that access powerMonitor events (suspend, resume, lock-screen, etc.) are potentially affected. The issue is not directly renderer-controllable. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8. | |
| Title | Electron: Use-after-free in PowerMonitor on Windows and macOS | |
| Weaknesses | CWE-416 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-08T03:55:36.380Z
Reserved: 2026-03-30T19:54:55.555Z
Link: CVE-2026-34770
Updated: 2026-04-06T19:10:11.362Z
Status : Analyzed
Published: 2026-04-04T00:16:17.823
Modified: 2026-04-22T15:10:05.463
Link: CVE-2026-34770
No data.
OpenCVE Enrichment
Updated: 2026-04-06T22:21:18Z
Github GHSA