Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.3
Electron: Malicious Input Can Leak Sensitive Data on macOS and Linux
GHSA-3c8v-cfp5-9885
CVE-2026-34776
Summary
Electron apps on macOS and Linux may leak sensitive information when handling certain inputs. This issue only affects apps that use a specific feature and run as the same user. To fix, update to a patched version of Electron, as there are no workarounds available for developers.
What to do
- Update electron to version 38.8.6.
- Update electron to version 39.8.1.
- Update electron to version 40.8.1.
- Update electron to version 41.0.0.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | electron | <= 38.8.6 | 38.8.6 |
| – | electron | > 39.0.0-alpha.1 , <= 39.8.1 | 39.8.1 |
| – | electron | > 40.0.0-alpha.1 , <= 40.8.1 | 40.8.1 |
| – | electron | > 41.0.0-alpha.1 , <= 41.0.0 | 41.0.0 |
Original title
Electron: Out-of-bounds read in second-instance IPC on macOS and Linux
Original description
### Impact
On macOS and Linux, apps that call `app.requestSingleInstanceLock()` were vulnerable to an out-of-bounds heap read when parsing a crafted second-instance message. Leaked memory could be delivered to the app's `second-instance` event handler.
This issue is limited to processes running as the same user as the Electron app.
Apps that do not call `app.requestSingleInstanceLock()` are not affected. Windows is not affected by this issue.
### Workarounds
There are no app side workarounds, developers must update to a patched version of Electron.
### Fixed Versions
* `41.0.0`
* `40.8.1`
* `39.8.1`
* `38.8.6`
### For more information
If there are any questions or comments about this advisory, please email [[email protected]](mailto:[email protected])
On macOS and Linux, apps that call `app.requestSingleInstanceLock()` were vulnerable to an out-of-bounds heap read when parsing a crafted second-instance message. Leaked memory could be delivered to the app's `second-instance` event handler.
This issue is limited to processes running as the same user as the Electron app.
Apps that do not call `app.requestSingleInstanceLock()` are not affected. Windows is not affected by this issue.
### Workarounds
There are no app side workarounds, developers must update to a patched version of Electron.
### Fixed Versions
* `41.0.0`
* `40.8.1`
* `39.8.1`
* `38.8.6`
### For more information
If there are any questions or comments about this advisory, please email [[email protected]](mailto:[email protected])
ghsa CVSS3.1
5.3
Vulnerability type
CWE-125
Out-of-bounds Read
Published: 3 Apr 2026 · Updated: 3 Apr 2026 · First seen: 3 Apr 2026