平台
javascript
组件
electron
修复版本
39.8.6
40.0.1
41.0.1
42.0.1
CVE-2026-34765 is a security vulnerability affecting the Electron framework, used for building cross-platform desktop applications. This issue arises from an incorrect scoping of named-window lookups when using window.open() in renderers. Exploitation could allow a malicious renderer to navigate a child window opened by a different renderer, potentially leading to unauthorized actions. Affected versions include Electron 39.0.0 through 41.1.0 and 42.0.0-alpha.1 to 42.0.0-alpha.4; a fix is available in Electron 39.8.5.
The vulnerability allows a malicious renderer process to hijack a child window opened by another renderer if they share the same target name. This can lead to a variety of attacks, including unauthorized access to sensitive data, modification of application state, and potentially even code execution depending on the webPreferences of the hijacked window. An attacker could craft a malicious webpage that, when opened within an Electron application, exploits this flaw to gain control of other windows within the same application. The blast radius is limited to applications using Electron and sharing target names between renderer processes, but the potential impact on user data and application integrity is significant.
This vulnerability was publicly disclosed on 2026-04-07. There is currently no indication of active exploitation in the wild, but the availability of a public description makes it a potential target. The vulnerability is not currently listed on the CISA KEV catalog. Public proof-of-concept exploits are not yet available, but the vulnerability's nature suggests that development of such exploits is likely.
Applications built using Electron that utilize shared target names for window.open() calls are at risk. This includes desktop applications that integrate web content or rely on complex window management. Developers using Electron's setWindowOpenHandler with permissive webPreferences are particularly vulnerable, as they may inadvertently grant attackers greater control over hijacked windows.
• linux / server: Monitor Electron application logs for unusual window navigation events or errors related to target name resolution. Use ps and lsof to identify running Electron processes and their associated files.
lsof -p $(pgrep electron)• generic web: Inspect network traffic for unexpected requests originating from Electron applications, particularly those involving window navigation. Use browser developer tools to monitor window.open() calls and their target names.
• javascript: Review Electron application code for instances of window.open() with shared target names. Look for code that might be vulnerable to cross-renderer context manipulation.
disclosure
漏洞利用状态
EPSS
0.06% (18% 百分位)
CISA SSVC
CVSS 向量
The primary mitigation is to upgrade to Electron version 39.8.5 or later. If upgrading is not immediately feasible, consider implementing stricter controls on the target names used in window.open() calls to ensure uniqueness across renderer processes. Carefully review and restrict the webPreferences settings for windows opened with setWindowOpenHandler to minimize the potential impact of a hijacked window. Implement robust input validation and sanitization to prevent malicious scripts from manipulating target names. After upgrading, verify the fix by attempting to open windows with the same target name from different renderer contexts and confirming that navigation is restricted.
Actualice a la versión 39.8.5, 40.8.5, 41.1.0 o 42.0.0-alpha.5 o superior. Revise el uso de `setWindowOpenHandler` para evitar la asignación de privilegios excesivos a las ventanas secundarias. Si es posible, evite el uso de `nodeIntegration: true` o `sandbox: false` en las ventanas secundarias.
漏洞分析和关键警报直接发送到您的邮箱。
CVE-2026-34765 is a medium severity vulnerability in Electron where a renderer can navigate a child window opened by another renderer using the same target name, potentially leading to unauthorized access.
You are affected if you are using Electron versions 39.0.0 through 41.1.0 or 42.0.0-alpha.1 to 42.0.0-alpha.4 and utilize shared target names in window.open() calls.
Upgrade to Electron version 39.8.5 or later. Consider stricter controls on target names and review webPreferences settings.
There is currently no indication of active exploitation in the wild, but the vulnerability's nature makes it a potential target.
Refer to the Electron security advisories on the Electron GitHub repository for official details: https://github.com/electron/electron/security/advisories