- Notifications
You must be signed in to change notification settings - Fork16.7k
Security: electron/electron
Security
SECURITY.md
The Electron team and community take security bugs in Electron seriously. We appreciate your efforts to responsibly disclose your findings, and will make every effort to acknowledge your contributions.
To report a security issue, please use the GitHub Security Advisory"Report a Vulnerability" tab.
The Electron team will send a response indicating the next steps in handling your report. After the initial reply to your report, the security team will keep you informed of the progress towards a fix and full announcement, and may ask for additional information or guidance.
Report security bugs in third-party modules to the person or team maintaining the module. You can also report a vulnerability through thenpm contact form by selecting "I'm reporting a security vulnerability".
If you do not receive an acknowledgement of your report within 6 business days, or if you cannot find a private security contact for the project, you may escalate to the OpenJS Foundation CNA atsecurity@lists.openjsf.org.
If the project acknowledges your report but does not provide any further response or engagement within 14 days, escalation is also appropriate.
For context on Electron's security notification process, please see theNotifications section of the Security WG'sMembership and Notifications Governance document.
To learn more about securing an Electron application, please see thesecurity tutorial.
- ASAR Integrity Bypass via resource modificationGHSA-vmqv-hx8q-j7mg published
Sep 3, 2025 byVerteDindeModerate - ASAR Integrity bypass by just modify the contentGHSA-xw5q-g62x-2qjc published
Jun 30, 2025 byVerteDindeHigh - Heap Buffer Overflow in NativeImage::CreateFromPathGHSA-6r2x-8pq8-9489 published
Jun 30, 2025 byVerteDindeModerate - Resource injection in the issue-opened.yml workflow leads to execution of arbitrary JavaScript code within a privileged workflowGHSA-2hfc-r8fq-92h7 published
Mar 27, 2024 byMarshallOfSoundModerate - ASAR Integrity bypass via filetype confusionGHSA-7m48-wc93-9g85 published
Dec 1, 2023 byMarshallOfSoundModerate - Out-of-package code execution when launched with arbitrary cwdGHSA-7x97-j373-85x5 published
Sep 6, 2023 byMarshallOfSoundModerate - Context isolation bypass via nested unserializable return valueGHSA-p7v2-p9m8-qqg7 published
Sep 6, 2023 byMarshallOfSoundModerate - Content-Secrity-Policy disabling eval not applied consistently in renderers with sandbox disabledGHSA-gxh7-wv9q-fwfr published
Sep 6, 2023 byMarshallOfSoundHigh - Exfiltration of hashed SMB credentials on Windows via file:// redirectGHSA-p2jh-44qj-pf2v published
Nov 7, 2022 byMarshallOfSoundModerate - AutoUpdater module fails to validate certain nested components of the bundle on macOSGHSA-77xc-hjv8-ww97 published
Jun 13, 2022 byMarshallOfSoundModerate