Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0, a service worker running in a session could spoof reply messages on the internal IPC channel used by webContents.executeJavaScript() and related methods, causing the main-process promise to resolve with attacker-controlled data. Apps are only affected if they have service workers registered and use the result of webContents.executeJavaScript() (or webFrameMain.executeJavaScript()) in security-sensitive decisions. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0.

Project Subscriptions

Vendors Products
Electron Subscribe
Electron Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xj5x-m3f3-5x3h Electron: Service worker can spoof executeJavaScript IPC replies
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Electron
Electron electron
Vendors & Products Electron
Electron electron
References
Metrics threat_severity

None

threat_severity

Moderate


Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 04 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0, a service worker running in a session could spoof reply messages on the internal IPC channel used by webContents.executeJavaScript() and related methods, causing the main-process promise to resolve with attacker-controlled data. Apps are only affected if they have service workers registered and use the result of webContents.executeJavaScript() (or webFrameMain.executeJavaScript()) in security-sensitive decisions. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0.
Title Electron: Service worker can spoof executeJavaScript IPC replies
Weaknesses CWE-290
CWE-345
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-06T15:50:49.205Z

Reserved: 2026-03-30T19:54:55.555Z

Link: CVE-2026-34778

cve-icon Vulnrichment

Updated: 2026-04-06T15:50:44.625Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-04T00:16:19.060

Modified: 2026-04-07T13:20:55.200

Link: CVE-2026-34778

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-03T23:59:07Z

Links: CVE-2026-34778 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T22:21:09Z

Weaknesses