CVE-2026-43944
electerm: dangerous code can be run through links or command line
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. From versions 3.0.6 to before 3.8.15, electerm is vulnerable to arbitrary local code execution via deep links, CLI --opts, or crafted shortcuts. Exploit requires clicking a crafted electerm://... link or opening a crafted shortcut/command that launches electerm with attacker-controlled opts. This issue has been patched in version 3.8.15.
| CWE | CWE-20 CWE-94 CWE-829 |
| Vendor | electerm |
| Product | electerm |
| Published | May 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for electerm electerm
Be the first to know when new unknown vulnerabilities affecting electerm electerm are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
electerm / electerm
>= 3.0.6, < 3.8.15
References
github.com: https://github.com/electerm/electerm/security/advisories/GHSA-mpm8-cx2p-626q github.com: https://github.com/electerm/electerm/commit/8a6a17951e96d715f5a231532bbd8303fe208700 github.com: https://github.com/electerm/electerm/commit/a79e06f4a1f0ac6376c3d2411ef4690fa0377742 github.com: https://github.com/electerm/electerm/releases/tag/v3.8.15