Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
5.3

Electron: Malicious Input Can Leak Sensitive Data on macOS and Linux

GHSA-3c8v-cfp5-9885 CVE-2026-34776
Summary

Electron apps on macOS and Linux may leak sensitive information when handling certain inputs. This issue only affects apps that use a specific feature and run as the same user. To fix, update to a patched version of Electron, as there are no workarounds available for developers.

What to do
  • Update electron to version 38.8.6.
  • Update electron to version 39.8.1.
  • Update electron to version 40.8.1.
  • Update electron to version 41.0.0.
Affected software
VendorProductAffected versionsFix available
electron <= 38.8.6 38.8.6
electron > 39.0.0-alpha.1 , <= 39.8.1 39.8.1
electron > 40.0.0-alpha.1 , <= 40.8.1 40.8.1
electron > 41.0.0-alpha.1 , <= 41.0.0 41.0.0
Original title
Electron: Out-of-bounds read in second-instance IPC on macOS and Linux
Original description
### Impact
On macOS and Linux, apps that call `app.requestSingleInstanceLock()` were vulnerable to an out-of-bounds heap read when parsing a crafted second-instance message. Leaked memory could be delivered to the app's `second-instance` event handler.

This issue is limited to processes running as the same user as the Electron app.

Apps that do not call `app.requestSingleInstanceLock()` are not affected. Windows is not affected by this issue.

### Workarounds
There are no app side workarounds, developers must update to a patched version of Electron.

### Fixed Versions
* `41.0.0`
* `40.8.1`
* `39.8.1`
* `38.8.6`

### For more information
If there are any questions or comments about this advisory, please email [[email protected]](mailto:[email protected])
ghsa CVSS3.1 5.3
Vulnerability type
CWE-125 Out-of-bounds Read
Published: 3 Apr 2026 · Updated: 3 Apr 2026 · First seen: 3 Apr 2026