Project Subscriptions
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jfqg-hf23-qpw2 | Electron: Context Isolation bypass via contextBridge VideoFrame transfer |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 14 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Electronjs
Electronjs electron |
|
| CPEs | cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha1:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha2:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha3:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha4:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha5:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:alpha6:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta1:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta2:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta3:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta4:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta5:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta6:*:*:*:node.js:*:* cpe:2.3:a:electronjs:electron:41.0.0:beta7:*:*:*:node.js:*:* |
|
| Vendors & Products |
Electronjs
Electronjs electron |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Electron
Electron electron |
|
| Weaknesses | CWE-501 | |
| Vendors & Products |
Electron
Electron electron |
|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 04 Apr 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. From versions 39.0.0-alpha.1 to before 39.8.0, 40.0.0-alpha.1 to before 40.7.0, and 41.0.0-alpha.1 to before 41.0.0-beta.8, apps that pass VideoFrame objects (from the WebCodecs API) across the contextBridge are vulnerable to a context isolation bypass. An attacker who can execute JavaScript in the main world (for example, via XSS) can use a bridged VideoFrame to gain access to the isolated world, including any Node.js APIs exposed to the preload script. Apps are only affected if a preload script returns, resolves, or passes a VideoFrame object to the main world via contextBridge.exposeInMainWorld(). Apps that do not bridge VideoFrame objects are not affected. This issue has been patched in versions 39.8.0, 40.7.0, and 41.0.0-beta.8. | |
| Title | Electron: Context Isolation bypass via contextBridge VideoFrame transfer | |
| Weaknesses | CWE-1188 CWE-668 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-08T03:55:42.004Z
Reserved: 2026-03-30T19:54:55.556Z
Link: CVE-2026-34780
Updated: 2026-04-06T15:49:17.194Z
Status : Analyzed
Published: 2026-04-04T01:16:39.540
Modified: 2026-04-14T19:02:23.427
Link: CVE-2026-34780
OpenCVE Enrichment
Updated: 2026-04-15T16:30:09Z
Github GHSA