๐Ÿ” CVE Alert

CVE-2026-43943

HIGH 7.8

electerm: RCE via malicious SSH server filename in openFileWithEditor

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
6th

electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. Prior to version 3.7.9, a code execution (RCE) vulnerability exists in electerm's SFTP open with system editor or "Edit with custom editor" feature. When a user opts to edit a file using open with system editor or open with a custom editor, the filename is passed directly into a command line without sanitization. A malicious actor controlling the SSH server or user OS can exploit this by crafting a filename containing shell metacharacters. If a victim subsequently attempts to edit this file, the injected commands are executed on their machine with the user's privileges. This could allow the attacker to run arbitrary code, install malware, or move laterally within the network. This issue has been patched in version 3.7.9.

CWE CWE-78 CWE-88
Vendor electerm
Product electerm
Published May 8, 2026
Last Updated May 8, 2026
Stay Ahead of the Next One

Get instant alerts for electerm electerm

Be the first to know when new high vulnerabilities affecting electerm electerm are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

electerm / electerm
< 3.7.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/electerm/electerm/security/advisories/GHSA-q4p8-8j9m-8hxj github.com: https://github.com/electerm/electerm/commit/24ce7103e264cffe6eb5476c0506a2379e6f8333 github.com: https://github.com/electerm/electerm/releases/tag/v3.7.9