๐Ÿ” CVE Alert

CVE-2026-34773

MEDIUM 4.7

Electron: Registry key path injection in app.setAsDefaultProtocolClient on Windows

CVSS Score
4.7
EPSS Score
0.0%
EPSS Percentile
8th

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0, on Windows, app.setAsDefaultProtocolClient(protocol) did not validate the protocol name before writing to the registry. Apps that pass untrusted input as the protocol name may allow an attacker to write to arbitrary subkeys under HKCU\Software\Classes\, potentially hijacking existing protocol handlers. Apps are only affected if they call app.setAsDefaultProtocolClient() with a protocol name derived from external or untrusted input. Apps that use a hardcoded protocol name are not affected. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0.

CWE CWE-20 CWE-74
Vendor electron
Product electron
Published Apr 3, 2026
Last Updated Apr 6, 2026
Stay Ahead of the Next One

Get instant alerts for electron electron

Be the first to know when new medium vulnerabilities affecting electron electron are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None

Affected Versions

electron / electron
< 38.8.6 >= 39.0.0-alpha.1, < 39.8.1 >= 40.0.0-alpha.1, < 40.8.1 >= 41.0.0-alpha.1, < 41.0.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/electron/electron/security/advisories/GHSA-mwmh-mq4g-g6gr