Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-34775

Summary
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
Published At-03 Apr, 2026 | 23:55
Updated At-08 Apr, 2026 | 03:55
Rejected At-
Credits

Electron: nodeIntegrationInWorker not correctly scoped in shared renderer processes

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.4, 40.8.4, and 41.0.0, the nodeIntegrationInWorker webPreference was not correctly scoped in all configurations. In certain process-sharing scenarios, workers spawned in frames configured with nodeIntegrationInWorker: false could still receive Node.js integration. Apps are only affected if they enable nodeIntegrationInWorker. Apps that do not use nodeIntegrationInWorker are not affected. This issue has been patched in versions 38.8.6, 39.8.4, 40.8.4, and 41.0.0.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:GitHub_M
Assigner Org ID:a0819718-46f1-4df5-94e2-005712e83aaa
Published At:03 Apr, 2026 | 23:55
Updated At:08 Apr, 2026 | 03:55
Rejected At:
â–¼CVE Numbering Authority (CNA)
Electron: nodeIntegrationInWorker not correctly scoped in shared renderer processes

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.4, 40.8.4, and 41.0.0, the nodeIntegrationInWorker webPreference was not correctly scoped in all configurations. In certain process-sharing scenarios, workers spawned in frames configured with nodeIntegrationInWorker: false could still receive Node.js integration. Apps are only affected if they enable nodeIntegrationInWorker. Apps that do not use nodeIntegrationInWorker are not affected. This issue has been patched in versions 38.8.6, 39.8.4, 40.8.4, and 41.0.0.

Affected Products
Vendor
Electron Userlandelectron
Product
electron
Versions
Affected
  • < 38.8.6
  • >= 39.0.0-alpha.1, < 39.8.4
  • >= 40.0.0-alpha.1, < 40.8.4
  • >= 41.0.0-alpha.1, < 41.0.0
Problem Types
TypeCWE IDDescription
CWECWE-653CWE-653: Improper Isolation or Compartmentalization
Type: CWE
CWE ID: CWE-653
Description: CWE-653: Improper Isolation or Compartmentalization
Metrics
VersionBase scoreBase severityVector
3.16.8MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/electron/electron/security/advisories/GHSA-xwr5-m59h-vwqr
x_refsource_CONFIRM
Hyperlink: https://github.com/electron/electron/security/advisories/GHSA-xwr5-m59h-vwqr
Resource:
x_refsource_CONFIRM
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-advisories@github.com
Published At:04 Apr, 2026 | 00:16
Updated At:22 Apr, 2026 | 17:49

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.4, 40.8.4, and 41.0.0, the nodeIntegrationInWorker webPreference was not correctly scoped in all configurations. In certain process-sharing scenarios, workers spawned in frames configured with nodeIntegrationInWorker: false could still receive Node.js integration. Apps are only affected if they enable nodeIntegrationInWorker. Apps that do not use nodeIntegrationInWorker are not affected. This issue has been patched in versions 38.8.6, 39.8.4, 40.8.4, and 41.0.0.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.8MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Electron (OpenJS Foundation)
electronjs
>>electron>>Versions before 38.8.6(exclusive)
cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>Versions from 39.0.0(inclusive) to 39.8.4(exclusive)
cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>Versions from 40.0.0(inclusive) to 40.8.4(exclusive)
cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:alpha1:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:alpha2:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:alpha3:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:alpha4:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:alpha5:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:alpha6:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:beta1:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:beta2:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:beta3:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:beta4:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:beta5:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:beta6:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:beta7:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:beta8:*:*:*:node.js:*:*
Weaknesses
CWE IDTypeSource
CWE-653Primarysecurity-advisories@github.com
CWE ID: CWE-653
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/electron/electron/security/advisories/GHSA-xwr5-m59h-vwqrsecurity-advisories@github.com
Vendor Advisory
Hyperlink: https://github.com/electron/electron/security/advisories/GHSA-xwr5-m59h-vwqr
Source: security-advisories@github.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

4Records found

CVE-2022-29247
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-2.2||LOW
EPSS-0.80% / 74.30%
||
7 Day CHG~0.00%
Published-13 Jun, 2022 | 21:05
Updated-23 Apr, 2025 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Exposure of Resource to Wrong Sphere in Electron

Electron is a framework for writing cross-platform desktop applications using JavaScript (JS), HTML, and CSS. A vulnerability in versions prior to 18.0.0-beta.6, 17.2.0, 16.2.6, and 15.5.5 allows a renderer with JS execution to obtain access to a new renderer process with `nodeIntegrationInSubFrames` enabled which in turn allows effective access to `ipcRenderer`. The `nodeIntegrationInSubFrames` option does not implicitly grant Node.js access. Rather, it depends on the existing sandbox setting. If an application is sandboxed, then `nodeIntegrationInSubFrames` just gives access to the sandboxed renderer APIs, which include `ipcRenderer`. If the application then additionally exposes IPC messages without IPC `senderFrame` validation that perform privileged actions or return confidential data this access to `ipcRenderer` can in turn compromise your application / user even with the sandbox enabled. Electron versions 18.0.0-beta.6, 17.2.0, 16.2.6, and 15.5.5 contain a fix for this issue. As a workaround, ensure that all IPC message handlers appropriately validate `senderFrame`.

Action-Not Available
Vendor-Electron UserlandElectron (OpenJS Foundation)
Product-electronelectron
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2023-23623
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.50% / 66.20%
||
7 Day CHG~0.00%
Published-06 Sep, 2023 | 20:16
Updated-26 Sep, 2024 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Content-Secrity-Policy disabling eval not applied consistently in renderers with sandbox disabled in Electron

Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. A Content-Security-Policy that disables eval, specifically setting a `script-src` directive and _not_ providing `unsafe-eval` in that directive, is not respected in renderers that have sandbox disabled. i.e. `sandbox: false` in the `webPreferences` object. This allows usage of methods like `eval()` and `new Function` unexpectedly which can result in an expanded attack surface. This issue only ever affected the 22 and 23 major versions of Electron and has been fixed in the latest versions of those release lines. Specifically, these versions contain the fixes: 22.0.1 and 23.0.0-alpha.2 We recommend all apps upgrade to the latest stable version of Electron. If upgrading isn't possible, this issue can be addressed without upgrading by enabling `sandbox: true` on all renderers.

Action-Not Available
Vendor-Electron UserlandElectron (OpenJS Foundation)
Product-electronelectronelectron
CWE ID-CWE-670
Always-Incorrect Control Flow Implementation
CVE-2024-33768
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.17% / 37.40%
||
7 Day CHG~0.00%
Published-01 May, 2024 | 00:00
Updated-15 Apr, 2025 | 17:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

lunasvg v2.3.9 was discovered to contain a segmentation violation via the component composition_solid_source_over.

Action-Not Available
Vendor-sammycagen/asammycage
Product-lunasvgn/alunasvg
CWE ID-CWE-653
Improper Isolation or Compartmentalization
CVE-2025-1974
Matching Score-4
Assigner-Kubernetes
ShareView Details
Matching Score-4
Assigner-Kubernetes
CVSS Score-9.8||CRITICAL
EPSS-91.13% / 99.66%
||
7 Day CHG~0.00%
Published-24 Mar, 2025 | 23:28
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ingress-nginx admission controller RCE escalation

A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

Action-Not Available
Vendor-Kubernetes
Product-ingress-nginx
CWE ID-CWE-653
Improper Isolation or Compartmentalization
Details not found