Context Isolation Vulnerability in Electron Framework
CVE-2026-34780

8.4HIGH

Key Information:

Vendor

Electron

Status
Vendor
CVE Published:
4 April 2026

What is CVE-2026-34780?

The Electron framework, used for building cross-platform desktop applications, has a vulnerability affecting specific versions. This issue arises when applications pass VideoFrame objects via the contextBridge, potentially allowing an attacker who can execute JavaScript in the main context (for instance, through cross-site scripting) to access the isolated context. If an application uses a preload script that returns or passes VideoFrame objects, it may be susceptible to unauthorized access to sensitive Node.js APIs. Mitigating this vulnerability is critical for applications relying on the Electron framework, and users are encouraged to update to the patched versions for enhanced security.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

electron >= 39.0.0-alpha.1, < 39.8.0 < 39.0.0-alpha.1, 39.8.0

electron >= 40.0.0-alpha.1, < 40.7.0 < 40.0.0-alpha.1, 40.7.0

electron >= 41.0.0-alpha.1, < 41.0.0-beta.8 < 41.0.0-alpha.1, 41.0.0-beta.8

References

CVSS V3.1

Score:
8.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.