| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-37j4-88rp-2f6h | Electerm's full process.env exposed to renderer via window.pre.env |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 08 May 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Electerm Project
Electerm Project electerm |
|
| CPEs | cpe:2.3:a:electerm_project:electerm:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Electerm Project
Electerm Project electerm |
Fri, 08 May 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. In versions 3.8.15 and prior, the getConstants() IPC handler in src/app/lib/ipc-sync.js serialises the entire process.env object and sends it to the renderer. The data is stored as window.pre.env and is accessible from any JavaScript running in the renderer (e.g., via the DevTools console or a compromised webview context). An attacker who achieves any JavaScript execution within the renderer can trivially exfiltrate these secrets to a remote server, leading to cloud account compromise, supply chain attacks, and lateral movement. At time of publication, there are no publicly available patches. | |
| Title | electerm: Full process.env exposed to renderer via window.pre.env in electerm | |
| Weaknesses | CWE-200 CWE-312 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-08T23:09:52.223Z
Reserved: 2026-05-04T16:59:09.090Z
Link: CVE-2026-43942
Updated: 2026-05-08T23:09:45.363Z
Status : Analyzed
Published: 2026-05-08T04:16:23.640
Modified: 2026-05-08T19:17:15.643
Link: CVE-2026-43942
No data.
OpenCVE Enrichment
Updated: 2026-05-08T05:30:46Z
Github GHSA