


Perceptive Security
SOC/SIEM Consultancy

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-bet…
Published:
3 April 2026 at 22:00:00
Alert date:
4 April 2026 at 01:01:48
Source:
nvd.nist.gov
Web Technologies, Supply Chain & Dependencies
A use-after-free vulnerability affects Electron framework applications that register asynchronous session.setPermissionRequestHandler(). The vulnerability occurs when handling fullscreen, pointer-lock, or keyboard-lock permission requests. If the requesting frame navigates or window closes while the permission handler is pending, invoking the stored callback dereferences freed memory, potentially leading to crash or memory corruption. Applications without permission request handlers or those with synchronous handlers are not affected. The issue has been patched in versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8.
Technical details
Mitigation steps:
Affected products:
Electron
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-34771
https://github.com/electron/electron/security/advisories/GHSA-8337-3p73-46f4
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
