Cross-Platform Application Framework Vulnerability in Electron
CVE-2026-34768

3.9LOW

Key Information:

Vendor

Electron

Status
Vendor
CVE Published:
3 April 2026

What is CVE-2026-34768?

The Electron framework has a security flaw on Windows that affects how the app.setLoginItemSettings({openAtLogin: true}) function processes executable paths. Prior to selected versions, this function unnecessarily writes the executable path to the Windows Run registry key without enclosing it in quotes, creating a potential exploit. If a user installs an application in a directory containing spaces, a malicious actor with write access to an ancestor directory may redirect the login process to execute an unintended application. While exploitation typically requires specific installation conditions, it poses a significant risk for applications deployed in non-standard locations. Users are encouraged to update to the patched versions: 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8 to mitigate this vulnerability.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

electron < 38.8.6 < 38.8.6

electron >= 39.0.0-alpha.1, < 39.8.1 < 39.0.0-alpha.1, 39.8.1

electron >= 40.0.0-alpha.1, < 40.8.0 < 40.0.0-alpha.1, 40.8.0

References

CVSS V3.1

Score:
3.9
Severity:
LOW
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.