CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
22.7%
In Electron before versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using “contextIsolation” are affected. There are no app-side workarounds, you must update your Electron version to be protected. This is fixed in versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21.
Vendor | Product | Version | CPE |
---|---|---|---|
electronjs | electron | * | cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:* |
electronjs | electron | 9.0.0 | cpe:2.3:a:electronjs:electron:9.0.0:-:*:*:*:*:*:* |
electronjs | electron | 9.0.0 | cpe:2.3:a:electronjs:electron:9.0.0:beta1:*:*:*:*:*:* |
electronjs | electron | 9.0.0 | cpe:2.3:a:electronjs:electron:9.0.0:beta10:*:*:*:*:*:* |
electronjs | electron | 9.0.0 | cpe:2.3:a:electronjs:electron:9.0.0:beta11:*:*:*:*:*:* |
electronjs | electron | 9.0.0 | cpe:2.3:a:electronjs:electron:9.0.0:beta12:*:*:*:*:*:* |
electronjs | electron | 9.0.0 | cpe:2.3:a:electronjs:electron:9.0.0:beta13:*:*:*:*:*:* |
electronjs | electron | 9.0.0 | cpe:2.3:a:electronjs:electron:9.0.0:beta14:*:*:*:*:*:* |
electronjs | electron | 9.0.0 | cpe:2.3:a:electronjs:electron:9.0.0:beta15:*:*:*:*:*:* |
electronjs | electron | 9.0.0 | cpe:2.3:a:electronjs:electron:9.0.0:beta16:*:*:*:*:*:* |
[
{
"product": "electron",
"vendor": "electron",
"versions": [
{
"status": "affected",
"version": "< 6.1.1"
},
{
"status": "affected",
"version": ">= 7.0.0, < 7.2.4"
},
{
"status": "affected",
"version": ">= 8.0.0, < 8.2.4"
},
{
"status": "affected",
"version": ">=9.0.0-beta.0, < 9.0.0-beta.21"
}
]
}
]
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
22.7%