Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xj5x-m3f3-5x3h | Electron: Service worker can spoof executeJavaScript IPC replies |
Mon, 20 Apr 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Electronjs
Electronjs electron |
|
| CPEs | cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha1:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha2:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha3:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha4:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha5:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha6:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta1:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta2:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta3:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta4:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta5:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta6:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta7:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta8:*:*:*:node.js:*:* |
|
| Vendors & Products |
Electronjs
Electronjs electron |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Electron
Electron electron |
|
| Vendors & Products |
Electron
Electron electron |
|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 04 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0, a service worker running in a session could spoof reply messages on the internal IPC channel used by webContents.executeJavaScript() and related methods, causing the main-process promise to resolve with attacker-controlled data. Apps are only affected if they have service workers registered and use the result of webContents.executeJavaScript() (or webFrameMain.executeJavaScript()) in security-sensitive decisions. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0. | |
| Title | Electron: Service worker can spoof executeJavaScript IPC replies | |
| Weaknesses | CWE-290 CWE-345 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-06T15:50:49.205Z
Reserved: 2026-03-30T19:54:55.555Z
Link: CVE-2026-34778
Updated: 2026-04-06T15:50:44.625Z
Status : Analyzed
Published: 2026-04-04T00:16:19.060
Modified: 2026-04-20T14:22:54.050
Link: CVE-2026-34778
OpenCVE Enrichment
Updated: 2026-04-06T22:21:09Z
Github GHSA