Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.5
Electron Apps on macOS Can Be Hijacked by Malicious Files
GHSA-5rqw-r77c-jp79
CVE-2026-34779
Summary
Some Electron apps on macOS can be tricked into running malicious AppleScript code if the user agrees to move the app to the Applications folder. This is a risk if your Electron app uses the `app.moveToApplicationsFolder()` function. To fix the issue, update your Electron app to version 41.0.0-beta.8 or later, or version 40.8.0, 39.8.1, or 38.8.6.
What to do
- Update electron to version 38.8.6.
- Update electron to version 39.8.1.
- Update electron to version 40.8.0.
- Update electron to version 41.0.0-beta.8.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | electron | <= 38.8.6 | 38.8.6 |
| – | electron | > 39.0.0-alpha.1 , <= 39.8.1 | 39.8.1 |
| – | electron | > 40.0.0-alpha.1 , <= 40.8.0 | 40.8.0 |
| – | electron | > 41.0.0-alpha.1 , <= 41.0.0-beta.8 | 41.0.0-beta.8 |
Original title
Electron: AppleScript injection in app.moveToApplicationsFolder on macOS
Original description
### Impact
On macOS, `app.moveToApplicationsFolder()` used an AppleScript fallback path that did not properly handle certain characters in the application bundle path. Under specific conditions, a crafted launch path could lead to arbitrary AppleScript execution when the user accepted the move-to-Applications prompt.
Apps are only affected if they call `app.moveToApplicationsFolder()`. Apps that do not use this API are not affected.
### Workarounds
There are no app side workarounds, developers must update to a patched version of Electron.
### Fixed Versions
* `41.0.0-beta.8`
* `40.8.0`
* `39.8.1`
* `38.8.6`
### For more information
If there are any questions or comments about this advisory, please email [[email protected]](mailto:[email protected])
On macOS, `app.moveToApplicationsFolder()` used an AppleScript fallback path that did not properly handle certain characters in the application bundle path. Under specific conditions, a crafted launch path could lead to arbitrary AppleScript execution when the user accepted the move-to-Applications prompt.
Apps are only affected if they call `app.moveToApplicationsFolder()`. Apps that do not use this API are not affected.
### Workarounds
There are no app side workarounds, developers must update to a patched version of Electron.
### Fixed Versions
* `41.0.0-beta.8`
* `40.8.0`
* `39.8.1`
* `38.8.6`
### For more information
If there are any questions or comments about this advisory, please email [[email protected]](mailto:[email protected])
ghsa CVSS3.1
6.5
Vulnerability type
CWE-78
OS Command Injection
Published: 3 Apr 2026 · Updated: 3 Apr 2026 · First seen: 3 Apr 2026