Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8337-3p73-46f4 | Electron: Use-after-free in WebContents fullscreen, pointer-lock, and keyboard-lock permission callbacks |
Wed, 22 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Electronjs
Electronjs electron |
|
| CPEs | cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha1:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha2:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha3:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha4:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha5:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha6:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta1:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta2:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta3:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta4:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta5:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta6:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta7:*:*:*:node.js:*:* |
|
| Vendors & Products |
Electronjs
Electronjs electron |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Electron
Electron electron |
|
| Weaknesses | CWE-364 | |
| Vendors & Products |
Electron
Electron electron |
|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 04 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8, apps that register an asynchronous session.setPermissionRequestHandler() may be vulnerable to a use-after-free when handling fullscreen, pointer-lock, or keyboard-lock permission requests. If the requesting frame navigates or the window closes while the permission handler is pending, invoking the stored callback dereferences freed memory, which may lead to a crash or memory corruption. Apps that do not set a permission request handler, or whose handler responds synchronously, are not affected. This issue has been patched in versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8. | |
| Title | Electron: Use-after-free in WebContents fullscreen, pointer-lock, and keyboard-lock permission callbacks | |
| Weaknesses | CWE-416 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-08T03:55:37.519Z
Reserved: 2026-03-30T19:54:55.555Z
Link: CVE-2026-34771
Updated: 2026-04-06T16:04:15.675Z
Status : Analyzed
Published: 2026-04-04T00:16:17.980
Modified: 2026-04-22T15:10:22.620
Link: CVE-2026-34771
OpenCVE Enrichment
Updated: 2026-04-07T07:16:27Z
Github GHSA