Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. electerm
  4. ›
  5. CVE-2026-43944

CVE-2026-43944: Electerm users can run dangrous code through link or command line

May 8, 2026

Arbitrary local code execution via deep links, CLI --opts, or crafted shortcuts. Affected users: electerm installs that accept protocol URLs or CLI options (affected versions listed in the original report). Exploit requires clicking a crafted electerm://... link or opening a crafted shortcut/command that launches electerm with attacker-controlled opts.

References

  • github.com/advisories/GHSA-mpm8-cx2p-626q
  • github.com/electerm/electerm
  • github.com/electerm/electerm/commit/8a6a17951e96d715f5a231532bbd8303fe208700
  • github.com/electerm/electerm/commit/a79e06f4a1f0ac6376c3d2411ef4690fa0377742
  • github.com/electerm/electerm/releases/tag/v3.8.15
  • github.com/electerm/electerm/security/advisories/GHSA-mpm8-cx2p-626q
  • nvd.nist.gov/vuln/detail/CVE-2026-43944

Code Behaviors & Features

Detect and mitigate CVE-2026-43944 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 3.0.6 before 3.8.15

Fixed versions

  • 3.8.15

Solution

Upgrade to version 3.8.15 or above.

Impact 9.6 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-20: Improper Input Validation
  • CWE-829: Inclusion of Functionality from Untrusted Control Sphere
  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

npm/electerm/CVE-2026-43944.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 00:21:00 +0000.