๐Ÿ” CVE Alert

CVE-2026-34776

MEDIUM 5.3

Electron: Out-of-bounds read in second-instance IPC on macOS and Linux

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
2th

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0, on macOS and Linux, apps that call app.requestSingleInstanceLock() were vulnerable to an out-of-bounds heap read when parsing a crafted second-instance message. Leaked memory could be delivered to the app's second-instance event handler. This issue is limited to processes running as the same user as the Electron app. Apps that do not call app.requestSingleInstanceLock() are not affected. Windows is not affected by this issue. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0.

CWE CWE-125
Vendor electron
Product electron
Published Apr 3, 2026
Last Updated Apr 6, 2026
Stay Ahead of the Next One

Get instant alerts for electron electron

Be the first to know when new medium vulnerabilities affecting electron electron are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
Low

Affected Versions

electron / electron
< 38.8.6 >= 39.0.0-alpha.1, < 39.8.1 >= 40.0.0-alpha.1, < 40.8.1 >= 41.0.0-alpha.1, < 41.0.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/electron/electron/security/advisories/GHSA-3c8v-cfp5-9885