Description
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0, on macOS and Linux, apps that call app.requestSingleInstanceLock() were vulnerable to an out-of-bounds heap read when parsing a crafted second-instance message. Leaked memory could be delivered to the app's second-instance event handler. This issue is limited to processes running as the same user as the Electron app. Apps that do not call app.requestSingleInstanceLock() are not affected. Windows is not affected by this issue. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0.
Published: 2026-04-03
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Out-of-bounds heap read leading to memory disclosure via second-instance IPC
Action: Patch
AI Analysis

Impact

Applications built with Electron that call app.requestSingleInstanceLock() on macOS or Linux can be tricked into reading memory beyond a buffer when processing a forged second-instance message. The flaw, a classic out-of-bounds heap read identified as CWE‑125, allows the attacker to acquire parts of the application's memory during the event handler and could expose sensitive data such as credentials or configuration files. The impact is the loss of confidentiality for information held by the victim process.

Affected Systems

Electron framework releases earlier than 38.8.6, 39.8.1, 40.8.1, or 41.0.0 on macOS and Linux are affected. Windows is exempt from this issue. Only applications that explicitly use app.requestSingleInstanceLock() are vulnerable; those that omit this call remain immune.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. Exploitation is local to the user who owns the Electron process and requires sending a crafted second‑instance IPC message. The attack vector is inferred from the description; no remote exploitation is reported. The vulnerability is not listed in the CISA KEV catalog, but a local attacker can potentially gain confidential information, representing a moderate to high risk in environments where applications handle sensitive data.

Generated by OpenCVE AI on April 4, 2026 at 02:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Electron to version 38.8.6, 39.8.1, 40.8.1, 41.0.0, or any later release that includes the patch.
  • If an immediate update is not feasible, remove or disable the use of app.requestSingleInstanceLock() and any associated second‑instance event handling.
  • Monitor the application for unexpected IPC traffic that could indicate attempts to exploit the vulnerability.
  • Review the vendor’s security advisories for any additional mitigations or updates.

Generated by OpenCVE AI on April 4, 2026 at 02:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3c8v-cfp5-9885 Electron: Out-of-bounds read in second-instance IPC on macOS and Linux
History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Electron
Electron electron
Vendors & Products Electron
Electron electron
References
Metrics threat_severity

None

threat_severity

Moderate


Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 04 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0, on macOS and Linux, apps that call app.requestSingleInstanceLock() were vulnerable to an out-of-bounds heap read when parsing a crafted second-instance message. Leaked memory could be delivered to the app's second-instance event handler. This issue is limited to processes running as the same user as the Electron app. Apps that do not call app.requestSingleInstanceLock() are not affected. Windows is not affected by this issue. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0.
Title Electron: Out-of-bounds read in second-instance IPC on macOS and Linux
Weaknesses CWE-125
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L'}


Subscriptions

Electron Electron
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-06T15:31:46.052Z

Reserved: 2026-03-30T19:54:55.555Z

Link: CVE-2026-34776

cve-icon Vulnrichment

Updated: 2026-04-06T15:31:37.235Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-04T00:16:18.753

Modified: 2026-04-07T13:20:55.200

Link: CVE-2026-34776

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-03T23:56:42Z

Links: CVE-2026-34776 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T22:21:11Z

Weaknesses