Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. electron
  4. ›
  5. CVE-2026-34776

CVE-2026-34776: Electron: Out-of-bounds read in second-instance IPC on macOS and Linux

April 3, 2026 (updated April 6, 2026)

On macOS and Linux, apps that call app.requestSingleInstanceLock() were vulnerable to an out-of-bounds heap read when parsing a crafted second-instance message. Leaked memory could be delivered to the app’s second-instance event handler.

This issue is limited to processes running as the same user as the Electron app.

Apps that do not call app.requestSingleInstanceLock() are not affected. Windows is not affected by this issue.

References

  • github.com/advisories/GHSA-3c8v-cfp5-9885
  • github.com/electron/electron
  • github.com/electron/electron/security/advisories/GHSA-3c8v-cfp5-9885
  • nvd.nist.gov/vuln/detail/CVE-2026-34776

Code Behaviors & Features

Detect and mitigate CVE-2026-34776 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 38.8.6, all versions starting from 39.0.0-alpha.1 before 39.8.1, all versions starting from 40.0.0-alpha.1 before 40.8.1, all versions starting from 41.0.0-alpha.1 before 41.0.0

Fixed versions

  • 38.8.6
  • 39.8.1
  • 40.8.1
  • 41.0.0

Solution

Upgrade to versions 38.8.6, 39.8.1, 40.8.1, 41.0.0 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L

Learn more about CVSS

Weakness

  • CWE-125: Out-of-bounds Read

Source file

npm/electron/CVE-2026-34776.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:02 +0000.