CVE-2026-34769
HIGHCVSS v3
7.7
HIGH
EPSS Score
—
exploit probability
CISA KEV
No
known exploited
Exploitation
—
SSVC status
Description
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8, an undocumented commandLineSwitches webPreference allowed arbitrary switches to be appended to the renderer process command line. Apps that construct webPreferences by spreading untrusted configuration objects may inadvertently allow an attacker to inject switches that disable renderer sandboxing or web security controls. Apps are on
Technical Details
- CVSS v3 Vector
- 3.1
- Published
- 4/4/2026
- Last Modified
- 4/9/2026
Frequently Asked Questions
What is CVE-2026-34769?
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8, an undocumented commandLineSwitches webPreference allowed arbitrary switches to be appended to the renderer process command line. Apps that construct webPreferences by spreading untrusted configuration objects may inadvertently allow an attacker to inject switches that disable renderer sandboxing or web security controls. Apps are on
Is CVE-2026-34769 actively exploited?
Active exploitation of CVE-2026-34769 has not been confirmed. The EPSS score is N/A%, indicating the estimated probability of exploitation in the next 30 days.
What is the CVSS score for CVE-2026-34769?
CVE-2026-34769 has a CVSS v3 base score of 7.7 (HIGH severity), with vector string 3.1.
Is CVE-2026-34769 affecting your environment?
Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.