electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. In versions 3.8.15 and prior, the getConstants() IPC handler in src/app/lib/ipc-sync.js serialises the entire process.env object and sends it to the renderer. The data is stored as window.pre.env and is accessible from any JavaScript running in the renderer (e.g., via the DevTools console or a compromised webview context). An attacker who achieves any JavaScript execution within the renderer can trivially exfiltrate these secrets to a remote server, leading to cloud account compromise, supply chain attacks, and lateral movement. At time of publication, there are no publicly available patches.

Project Subscriptions

Vendors Products
Electerm Project Subscribe
Electerm Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-37j4-88rp-2f6h Electerm's full process.env exposed to renderer via window.pre.env
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 08 May 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 08 May 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Electerm Project
Electerm Project electerm
CPEs cpe:2.3:a:electerm_project:electerm:*:*:*:*:*:*:*:*
Vendors & Products Electerm Project
Electerm Project electerm

Fri, 08 May 2026 04:00:00 +0000

Type Values Removed Values Added
Description electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. In versions 3.8.15 and prior, the getConstants() IPC handler in src/app/lib/ipc-sync.js serialises the entire process.env object and sends it to the renderer. The data is stored as window.pre.env and is accessible from any JavaScript running in the renderer (e.g., via the DevTools console or a compromised webview context). An attacker who achieves any JavaScript execution within the renderer can trivially exfiltrate these secrets to a remote server, leading to cloud account compromise, supply chain attacks, and lateral movement. At time of publication, there are no publicly available patches.
Title electerm: Full process.env exposed to renderer via window.pre.env in electerm
Weaknesses CWE-200
CWE-312
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-08T23:09:52.223Z

Reserved: 2026-05-04T16:59:09.090Z

Link: CVE-2026-43942

cve-icon Vulnrichment

Updated: 2026-05-08T23:09:45.363Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-08T04:16:23.640

Modified: 2026-05-08T19:17:15.643

Link: CVE-2026-43942

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T05:30:46Z

Weaknesses