Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.3, 40.8.3, and 41.0.3, apps that register custom protocol handlers via protocol.handle() / protocol.registerSchemesAsPrivileged() or modify response headers via webRequest.onHeadersReceived may be vulnerable to HTTP response header injection if attacker-controlled input is reflected into a response header name or value. An attacker who can influence a header value may be able to inject additional response headers, affecting cookies, content security policy, or cross-origin access controls. Apps that do not reflect external input into response headers are not affected. This issue has been patched in versions 38.8.6, 39.8.3, 40.8.3, and 41.0.3.
References
| Link | Resource |
|---|---|
| https://github.com/electron/electron/security/advisories/GHSA-4p4r-m79c-wq3v | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
09 Apr 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/electron/electron/security/advisories/GHSA-4p4r-m79c-wq3v - Vendor Advisory | |
| CPE | cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:* | |
| First Time |
Electronjs electron
Electronjs |
04 Apr 2026, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-04 00:16
Updated : 2026-04-09 16:16
NVD link : CVE-2026-34767
Mitre link : CVE-2026-34767
CVE.ORG link : CVE-2026-34767
JSON object : View
Products Affected
electronjs
- electron
