6.8
CVSSv2

CVE-2018-1000136

Published: 23/03/2018 Updated: 03/10/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 607
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Electron version 1.7 up to 1.7.12; 1.8 up to 1.8.3 and 2.0.0 up to 2.0.0-beta.3 contains an improper handling of values vulnerability in Webviews that can result in remote code execution. This attack appear to be exploitable via an app which allows execution of 3rd party code AND disallows node integration AND has not specified if webview is enabled/disabled. This vulnerability appears to have been fixed in 1.7.13, 1.8.4, 2.0.0-beta.4.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

electronjs electron 2.0.0

electronjs electron

Vendor Advisories

Electron version 17 up to 1712; 18 up to 183 and 200 up to 200-beta3 contains an improper handling of values vulnerability in Webviews that can result in remote code execution This attack appear to be exploitable via an app which allows execution of 3rd party code AND disallows node integration AND has not specified if webview is enable ...

Recent Articles

Have you updated your Electron app? We hope so. There was a bad code-injection bug in it
The Register • Richard Chirgwin • 14 May 2018

Infosec bods remind devs, users to check for patches

Electron – the widely used desktop application framework that renders top programs such as Slack, Atom, and Visual Studio Code – suffered from a security vulnerability that potentially allows miscreants to execute evil code on victims' computers. That means applications relying on Electron may need updating. If you use an Electron-based program – there's a list here – you should follow best practices and make sure you're running the latest release of the software. And app developers shou...