Description
electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. Prior to version 3.3.8, a command injection vulnerability exists in github.com/elcterm/electerm/npm/install.js:130. The runLinux() function appends attacker-controlled remote version strings directly into an exec("rm -rf ...") command without validation. This issue has been patched in version 3.3.8.
Published: 2026-05-08
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the runLinux() function of electerm’s npm/install.js script, where attacker‑controlled remote version strings are directly concatenated into an exec("rm -rf …") command without any validation. This weakness (CWE‑77) allows an attacker to inject arbitrary shell commands that are executed with the privileges of the electerm process, resulting in full compromise of the machine on which electerm runs. The impact spans all layers of the OS: confidentiality, integrity, and availability can all be broken, and the attacker gains persistent remote code execution capability.

Affected Systems

Electerm, an open‑source multi‑protocol terminal client, is affected in all releases prior to version 3.3.8. The vendor product name is electerm: electerm. Users of any older electerm version should be aware that the runLinux() function is exposed to unvalidated input. The vulnerability is fixed in electerm v3.3.8 and later.

Risk and Exploitability

With a CVSS score of 9.8, the risk level is critical. Although an EPSS score is not provided, the lack of a KEV listing does not diminish the inherent danger posed by a command injection that can be triggered remotely. Inferred from the description, the attack vector requires an attacker to supply a malicious remote version string, likely through a forged update payload or a compromised server that electerm contacts. Once the payload is processed, the attacker can execute any command with the electerm process’s privileges, enabling full system takeover.

Generated by OpenCVE AI on May 8, 2026 at 05:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade electerm to version 3.3.8 or later, which removes the unvalidated string concatenation from runLinux().
  • If an upgrade is not immediately possible, isolate or disable the runLinux() feature by editing the configuration or by applying a local patch that removes the unsafe exec call and adds input validation.
  • As a temporary control, restrict network connectivity for electerm or use a firewall to block connections to untrusted endpoints from which a malicious remote version string could be received.

Generated by OpenCVE AI on May 8, 2026 at 05:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-8x35-hph8-37hq electerm has Command Injection via runLinux funtion
History

Fri, 08 May 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 08 May 2026 04:00:00 +0000

Type Values Removed Values Added
Description electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. Prior to version 3.3.8, a command injection vulnerability exists in github.com/elcterm/electerm/npm/install.js:130. The runLinux() function appends attacker-controlled remote version strings directly into an exec("rm -rf ...") command without validation. This issue has been patched in version 3.3.8.
Title electerm has Command Injection Vulnerability via runLinux function
Weaknesses CWE-77
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-08T11:19:54.297Z

Reserved: 2026-04-20T18:18:50.680Z

Link: CVE-2026-41501

cve-icon Vulnrichment

Updated: 2026-05-08T11:19:50.342Z

cve-icon NVD

Status : Received

Published: 2026-05-08T04:16:17.940

Modified: 2026-05-08T04:16:17.940

Link: CVE-2026-41501

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T05:30:46Z

Weaknesses