{"api_version":"1","generated_at":"2026-04-23T02:38:02+00:00","cve":"CVE-2026-34777","urls":{"html":"https://cve.report/CVE-2026-34777","api":"https://cve.report/api/cve/CVE-2026-34777.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-34777","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-34777"},"summary":{"title":"Electron: Incorrect origin passed to permission request handler for iframe requests","description":"Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0, when an iframe requests fullscreen, pointerLock, keyboardLock, openExternal, or media permissions, the origin passed to session.setPermissionRequestHandler() was the top-level page's origin rather than the requesting iframe's origin. Apps that grant permissions based on the origin parameter or webContents.getURL() may inadvertently grant permissions to embedded third-party content. The correct requesting URL remains available via details.requestingUrl. Apps that already check details.requestingUrl are not affected. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-04-04 00:16:18","updated_at":"2026-04-20 14:19:18"},"problem_types":["CWE-346","CWE-346 CWE-346: Origin Validation Error"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"5.4","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"5.4","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/electron/electron/security/advisories/GHSA-r5p7-gp4j-qhrx","name":"https://github.com/electron/electron/security/advisories/GHSA-r5p7-gp4j-qhrx","refsource":"security-advisories@github.com","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-34777","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-34777","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"electron","product":"electron","version":"affected < 38.8.6","platforms":[]},{"source":"CNA","vendor":"electron","product":"electron","version":"affected >= 39.0.0-alpha.1, < 39.8.1","platforms":[]},{"source":"CNA","vendor":"electron","product":"electron","version":"affected >= 40.0.0-alpha.1, < 40.8.1","platforms":[]},{"source":"CNA","vendor":"electron","product":"electron","version":"affected >= 41.0.0-alpha.1, < 41.0.0","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"34777","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"electronjs","cpe5":"electron","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"node.js","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"34777","cve":"CVE-2026-34777","epss":"0.000140000","percentile":"0.026510000","score_date":"2026-04-07","updated_at":"2026-04-08 00:03:39"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-34777","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-04-06T15:32:48.135022Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-06T15:33:30.315Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"electron","vendor":"electron","versions":[{"status":"affected","version":"< 38.8.6"},{"status":"affected","version":">= 39.0.0-alpha.1, < 39.8.1"},{"status":"affected","version":">= 40.0.0-alpha.1, < 40.8.1"},{"status":"affected","version":">= 41.0.0-alpha.1, < 41.0.0"}]}],"descriptions":[{"lang":"en","value":"Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0, when an iframe requests fullscreen, pointerLock, keyboardLock, openExternal, or media permissions, the origin passed to session.setPermissionRequestHandler() was the top-level page's origin rather than the requesting iframe's origin. Apps that grant permissions based on the origin parameter or webContents.getURL() may inadvertently grant permissions to embedded third-party content. The correct requesting URL remains available via details.requestingUrl. Apps that already check details.requestingUrl are not affected. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-346","description":"CWE-346: Origin Validation Error","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-03T23:57:36.488Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/electron/electron/security/advisories/GHSA-r5p7-gp4j-qhrx","tags":["x_refsource_CONFIRM"],"url":"https://github.com/electron/electron/security/advisories/GHSA-r5p7-gp4j-qhrx"}],"source":{"advisory":"GHSA-r5p7-gp4j-qhrx","discovery":"UNKNOWN"},"title":"Electron: Incorrect origin passed to permission request handler for iframe requests"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-34777","datePublished":"2026-04-03T23:57:36.488Z","dateReserved":"2026-03-30T19:54:55.555Z","dateUpdated":"2026-04-06T15:33:30.315Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-04 00:16:18","lastModifiedDate":"2026-04-20 14:19:18","problem_types":["CWE-346","CWE-346 CWE-346: Origin Validation Error"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*","versionEndExcluding":"38.8.6","matchCriteriaId":"9CE003A2-03CC-4355-AA17-2CBD204EC6C3"},{"vulnerable":true,"criteria":"cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*","versionStartIncluding":"39.0.0","versionEndExcluding":"39.8.1","matchCriteriaId":"8F28D187-306E-4C9D-ADED-56DD79B04AF3"},{"vulnerable":true,"criteria":"cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*","versionStartIncluding":"40.0.0","versionEndExcluding":"40.8.1","matchCriteriaId":"A8E19E38-B08F-4075-A564-E14DC3F54078"},{"vulnerable":true,"criteria":"cpe:2.3:a:electronjs:electron:41.0.0:alpha1:*:*:*:node.js:*:*","matchCriteriaId":"A20225D6-F435-4D09-962D-B162F521B6AD"},{"vulnerable":true,"criteria":"cpe:2.3:a:electronjs:electron:41.0.0:alpha2:*:*:*:node.js:*:*","matchCriteriaId":"33712802-EB60-4E9A-83B8-9F2320B70CB4"},{"vulnerable":true,"criteria":"cpe:2.3:a:electronjs:electron:41.0.0:alpha3:*:*:*:node.js:*:*","matchCriteriaId":"9D0A9142-54FE-47BB-9FEB-5E97528E28FE"},{"vulnerable":true,"criteria":"cpe:2.3:a:electronjs:electron:41.0.0:alpha4:*:*:*:node.js:*:*","matchCriteriaId":"9E1D191F-DEAE-4DB3-9822-F31AF9FE3BAC"},{"vulnerable":true,"criteria":"cpe:2.3:a:electronjs:electron:41.0.0:alpha5:*:*:*:node.js:*:*","matchCriteriaId":"45A8192F-3D2C-4987-9BBE-7ECC3F71965D"},{"vulnerable":true,"criteria":"cpe:2.3:a:electronjs:electron:41.0.0:alpha6:*:*:*:node.js:*:*","matchCriteriaId":"EEA1A2E5-03DB-46CB-8427-7F31A8A7CE1C"},{"vulnerable":true,"criteria":"cpe:2.3:a:electronjs:electron:41.0.0:beta1:*:*:*:node.js:*:*","matchCriteriaId":"B2DFCE75-BD3F-4537-B5B8-14097E262EA2"},{"vulnerable":true,"criteria":"cpe:2.3:a:electronjs:electron:41.0.0:beta2:*:*:*:node.js:*:*","matchCriteriaId":"BC346E25-EA43-4615-8CDB-16D15D46E4FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:electronjs:electron:41.0.0:beta3:*:*:*:node.js:*:*","matchCriteriaId":"FA5B3C00-CAFC-4995-BF35-9920F3039E77"},{"vulnerable":true,"criteria":"cpe:2.3:a:electronjs:electron:41.0.0:beta4:*:*:*:node.js:*:*","matchCriteriaId":"3672F3FB-6B5E-40FD-8A92-CB4DD6BC6A93"},{"vulnerable":true,"criteria":"cpe:2.3:a:electronjs:electron:41.0.0:beta5:*:*:*:node.js:*:*","matchCriteriaId":"9EE4F8AE-21D2-4815-85B7-B7ECCC0D5059"},{"vulnerable":true,"criteria":"cpe:2.3:a:electronjs:electron:41.0.0:beta6:*:*:*:node.js:*:*","matchCriteriaId":"D195760C-7DD9-4259-9042-EDE65AEAC1D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:electronjs:electron:41.0.0:beta7:*:*:*:node.js:*:*","matchCriteriaId":"B370859F-24D3-4B25-B580-1A5B6DB94BFE"},{"vulnerable":true,"criteria":"cpe:2.3:a:electronjs:electron:41.0.0:beta8:*:*:*:node.js:*:*","matchCriteriaId":"7F47CFAE-9744-4B54-B7E4-BB8E4346FDBA"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"34777","Ordinal":"1","Title":"Electron: Incorrect origin passed to permission request handler ","CVE":"CVE-2026-34777","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"34777","Ordinal":"1","NoteData":"Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0, when an iframe requests fullscreen, pointerLock, keyboardLock, openExternal, or media permissions, the origin passed to session.setPermissionRequestHandler() was the top-level page's origin rather than the requesting iframe's origin. Apps that grant permissions based on the origin parameter or webContents.getURL() may inadvertently grant permissions to embedded third-party content. The correct requesting URL remains available via details.requestingUrl. Apps that already check details.requestingUrl are not affected. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0.","Type":"Description","Title":"Electron: Incorrect origin passed to permission request handler "}]}}}