Project Subscriptions
No data.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-q4p8-8j9m-8hxj | Electerm Security Vulnerability: RCE via malicious SSH server filename in openFileWithEditor |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 08 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Electerm Project
Electerm Project electerm |
|
| CPEs | cpe:2.3:a:electerm_project:electerm:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Electerm Project
Electerm Project electerm |
Fri, 08 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. Prior to version 3.7.9, a code execution (RCE) vulnerability exists in electerm's SFTP open with system editor or "Edit with custom editor" feature. When a user opts to edit a file using open with system editor or open with a custom editor, the filename is passed directly into a command line without sanitization. A malicious actor controlling the SSH server or user OS can exploit this by crafting a filename containing shell metacharacters. If a victim subsequently attempts to edit this file, the injected commands are executed on their machine with the user's privileges. This could allow the attacker to run arbitrary code, install malware, or move laterally within the network. This issue has been patched in version 3.7.9. | |
| Title | electerm: RCE via malicious SSH server filename in openFileWithEditor | |
| Weaknesses | CWE-78 CWE-88 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-08T14:44:16.203Z
Reserved: 2026-05-04T16:59:09.090Z
Link: CVE-2026-43943
Updated: 2026-05-08T14:44:05.353Z
Status : Analyzed
Published: 2026-05-08T04:16:23.837
Modified: 2026-05-08T19:16:45.713
Link: CVE-2026-43943
No data.
OpenCVE Enrichment
Updated: 2026-05-08T06:00:11Z
Github GHSA