CVE-2026-43942: Electerm's full process.env exposed to renderer via window.pre.env
The getConstants() IPC handler in src/app/lib/ipc-sync.js serialises the entire process.env object and sends it to the renderer. The data is stored as window.pre.env and is accessible from any JavaScript running in the renderer (e.g., via the DevTools console or a compromised webview context).
On developer and CI machines, process.env routinely contains secrets such as:
AWS_SECRET_ACCESS_KEY/AWS_SESSION_TOKENGITHUB_TOKEN/NPM_TOKENOPENAI_API_KEY/DOCKER_AUTH- Internal service credentials, API keys, and database URLs
An attacker who achieves any JavaScript execution within the renderer—for example, through a malicious plugin, a cross-site scripting (XSS) flaw, or the terminal hyperlink execution chain—can trivially exfiltrate these secrets to a remote server, leading to cloud account compromise, supply chain attacks, and lateral movement. The exposure is visible even without any code execution by simply opening the “Info” modal in the application, though that requires local access.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-43942 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →