๐Ÿ” CVE Alert

CVE-2026-34768

LOW 3.9

Electron: Unquoted executable path in app.setLoginItemSettings on Windows

CVSS Score
3.9
EPSS Score
0.0%
EPSS Percentile
2th

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8, on Windows, app.setLoginItemSettings({openAtLogin: true}) wrote the executable path to the Run registry key without quoting. If the app is installed to a path containing spaces, an attacker with write access to an ancestor directory may be able to cause a different executable to run at login instead of the intended app. On a default Windows install, standard system directories are protected against writes by standard users, so exploitation typically requires a non-standard install location. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8.

CWE CWE-428
Vendor electron
Product electron
Published Apr 3, 2026
Last Updated Apr 6, 2026
Stay Ahead of the Next One

Get instant alerts for electron electron

Be the first to know when new low vulnerabilities affecting electron electron are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Local
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Affected Versions

electron / electron
< 38.8.6 >= 39.0.0-alpha.1, < 39.8.1 >= 40.0.0-alpha.1, < 40.8.0 >= 41.0.0-alpha.1, < 41.0.0-beta.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/electron/electron/security/advisories/GHSA-jfqx-fxh3-c62j