Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.5

Electron Apps on macOS Can Be Hijacked by Malicious Files

GHSA-5rqw-r77c-jp79 CVE-2026-34779
Summary

Some Electron apps on macOS can be tricked into running malicious AppleScript code if the user agrees to move the app to the Applications folder. This is a risk if your Electron app uses the `app.moveToApplicationsFolder()` function. To fix the issue, update your Electron app to version 41.0.0-beta.8 or later, or version 40.8.0, 39.8.1, or 38.8.6.

What to do
  • Update electron to version 38.8.6.
  • Update electron to version 39.8.1.
  • Update electron to version 40.8.0.
  • Update electron to version 41.0.0-beta.8.
Affected software
VendorProductAffected versionsFix available
electron <= 38.8.6 38.8.6
electron > 39.0.0-alpha.1 , <= 39.8.1 39.8.1
electron > 40.0.0-alpha.1 , <= 40.8.0 40.8.0
electron > 41.0.0-alpha.1 , <= 41.0.0-beta.8 41.0.0-beta.8
Original title
Electron: AppleScript injection in app.moveToApplicationsFolder on macOS
Original description
### Impact
On macOS, `app.moveToApplicationsFolder()` used an AppleScript fallback path that did not properly handle certain characters in the application bundle path. Under specific conditions, a crafted launch path could lead to arbitrary AppleScript execution when the user accepted the move-to-Applications prompt.

Apps are only affected if they call `app.moveToApplicationsFolder()`. Apps that do not use this API are not affected.

### Workarounds
There are no app side workarounds, developers must update to a patched version of Electron.

### Fixed Versions
* `41.0.0-beta.8`
* `40.8.0`
* `39.8.1`
* `38.8.6`

### For more information
If there are any questions or comments about this advisory, please email [[email protected]](mailto:[email protected])
ghsa CVSS3.1 6.5
Vulnerability type
CWE-78 OS Command Injection
Published: 3 Apr 2026 · Updated: 3 Apr 2026 · First seen: 3 Apr 2026