top of page
perceptive_background_267k.jpg

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-bet…

Published:

3 April 2026 at 22:00:00

Alert date:

4 April 2026 at 01:01:48

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Supply Chain & Dependencies

A use-after-free vulnerability affects Electron framework applications that register asynchronous session.setPermissionRequestHandler(). The vulnerability occurs when handling fullscreen, pointer-lock, or keyboard-lock permission requests. If the requesting frame navigates or window closes while the permission handler is pending, invoking the stored callback dereferences freed memory, potentially leading to crash or memory corruption. Applications without permission request handlers or those with synchronous handlers are not affected. The issue has been patched in versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8.

Technical details

Mitigation steps:

Affected products:

Electron

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page