{"api_version":"1","generated_at":"2026-04-11T05:31:59+00:00","cve":"CVE-2026-34781","urls":{"html":"https://cve.report/CVE-2026-34781","api":"https://cve.report/api/cve/CVE-2026-34781.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-34781","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-34781"},"summary":{"title":"Electron crashes in clipboard.readImage() on malformed clipboard image data","description":"Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to 39.8.5, 40.8.5, 41.1.0, and 42.0.0-alpha.5, apps that call clipboard.readImage() may be vulnerable to a denial of service. If the system clipboard contains image data that fails to decode, the resulting null bitmap is passed unchecked to image construction, triggering a controlled abort and crashing the process. Apps are only affected if they call clipboard.readImage(). Apps that do not read images from the clipboard are not affected. This issue does not allow memory corruption or code execution. This vulnerability is fixed in 39.8.5, 40.8.5, 41.1.0, and 42.0.0-alpha.5.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-04-07 22:16:23","updated_at":"2026-04-08 21:27:00"},"problem_types":["CWE-476","CWE-476 CWE-476: NULL Pointer Dereference"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"2.8","severity":"LOW","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L","baseScore":2.8,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"2.8","severity":"LOW","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L","data":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":2.8,"baseSeverity":"LOW","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L","version":"3.1"}}],"references":[{"url":"https://github.com/electron/electron/security/advisories/GHSA-f37v-82c4-4x64","name":"https://github.com/electron/electron/security/advisories/GHSA-f37v-82c4-4x64","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-34781","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-34781","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"electron","product":"electron","version":"affected < 39.8.5","platforms":[]},{"source":"CNA","vendor":"electron","product":"electron","version":"affected >= 40.0.0-alpha.1, < 40.8.5","platforms":[]},{"source":"CNA","vendor":"electron","product":"electron","version":"affected >= 41.0.0-alpha.1, < 41.1.0","platforms":[]},{"source":"CNA","vendor":"electron","product":"electron","version":"affected >= 42.0.0-alpha.1, < 42.0.0-alpha.5","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"34781","cve":"CVE-2026-34781","epss":"0.000140000","percentile":"0.024460000","score_date":"2026-04-10","updated_at":"2026-04-11 00:00:35"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-34781","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-04-08T16:10:12.958024Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-08T16:14:38.564Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"electron","vendor":"electron","versions":[{"status":"affected","version":"< 39.8.5"},{"status":"affected","version":">= 40.0.0-alpha.1, < 40.8.5"},{"status":"affected","version":">= 41.0.0-alpha.1, < 41.1.0"},{"status":"affected","version":">= 42.0.0-alpha.1, < 42.0.0-alpha.5"}]}],"descriptions":[{"lang":"en","value":"Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to 39.8.5, 40.8.5, 41.1.0, and 42.0.0-alpha.5, apps that call clipboard.readImage() may be vulnerable to a denial of service. If the system clipboard contains image data that fails to decode, the resulting null bitmap is passed unchecked to image construction, triggering a controlled abort and crashing the process. Apps are only affected if they call clipboard.readImage(). Apps that do not read images from the clipboard are not affected. This issue does not allow memory corruption or code execution. This vulnerability is fixed in 39.8.5, 40.8.5, 41.1.0, and 42.0.0-alpha.5."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":2.8,"baseSeverity":"LOW","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-476","description":"CWE-476: NULL Pointer Dereference","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-07T21:20:12.517Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/electron/electron/security/advisories/GHSA-f37v-82c4-4x64","tags":["x_refsource_CONFIRM"],"url":"https://github.com/electron/electron/security/advisories/GHSA-f37v-82c4-4x64"}],"source":{"advisory":"GHSA-f37v-82c4-4x64","discovery":"UNKNOWN"},"title":"Electron crashes in clipboard.readImage() on malformed clipboard image data"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-34781","datePublished":"2026-04-07T21:20:12.517Z","dateReserved":"2026-03-30T19:54:55.556Z","dateUpdated":"2026-04-08T16:14:38.564Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-07 22:16:23","lastModifiedDate":"2026-04-08 21:27:00","problem_types":["CWE-476","CWE-476 CWE-476: NULL Pointer Dereference"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L","baseScore":2.8,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":1.3,"impactScore":1.4}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"34781","Ordinal":"1","Title":"Electron crashes in clipboard.readImage() on malformed clipboard","CVE":"CVE-2026-34781","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"34781","Ordinal":"1","NoteData":"Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to 39.8.5, 40.8.5, 41.1.0, and 42.0.0-alpha.5, apps that call clipboard.readImage() may be vulnerable to a denial of service. If the system clipboard contains image data that fails to decode, the resulting null bitmap is passed unchecked to image construction, triggering a controlled abort and crashing the process. Apps are only affected if they call clipboard.readImage(). Apps that do not read images from the clipboard are not affected. This issue does not allow memory corruption or code execution. This vulnerability is fixed in 39.8.5, 40.8.5, 41.1.0, and 42.0.0-alpha.5.","Type":"Description","Title":"Electron crashes in clipboard.readImage() on malformed clipboard"}]}}}