{"api_version":"1","generated_at":"2026-05-08T10:59:42+00:00","cve":"CVE-2026-43943","urls":{"html":"https://cve.report/CVE-2026-43943","api":"https://cve.report/api/cve/CVE-2026-43943.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-43943","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-43943"},"summary":{"title":"electerm: RCE via malicious SSH server filename in openFileWithEditor","description":"electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. Prior to version 3.7.9, a code execution (RCE) vulnerability exists in electerm's SFTP open with system editor or \"Edit with custom editor\" feature. When a user opts to edit a file using open with system editor or open with a custom editor, the filename is passed directly into a command line without sanitization. A malicious actor controlling the SSH server or user OS can exploit this by crafting a filename containing shell metacharacters. If a victim subsequently attempts to edit this file, the injected commands are executed on their machine with the user's privileges. This could allow the attacker to run arbitrary code, install malware, or move laterally within the network. This issue has been patched in version 3.7.9.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-05-08 04:16:23","updated_at":"2026-05-08 04:16:23"},"problem_types":["CWE-78","CWE-88","CWE-78 CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","CWE-88 CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"7.8","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"7.8","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://github.com/electerm/electerm/security/advisories/GHSA-q4p8-8j9m-8hxj","name":"https://github.com/electerm/electerm/security/advisories/GHSA-q4p8-8j9m-8hxj","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/electerm/electerm/commit/24ce7103e264cffe6eb5476c0506a2379e6f8333","name":"https://github.com/electerm/electerm/commit/24ce7103e264cffe6eb5476c0506a2379e6f8333","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/electerm/electerm/releases/tag/v3.7.9","name":"https://github.com/electerm/electerm/releases/tag/v3.7.9","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-43943","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-43943","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"electerm","product":"electerm","version":"affected < 3.7.9","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"electerm","vendor":"electerm","versions":[{"status":"affected","version":"< 3.7.9"}]}],"descriptions":[{"lang":"en","value":"electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. Prior to version 3.7.9, a code execution (RCE) vulnerability exists in electerm's SFTP open with system editor or \"Edit with custom editor\" feature. When a user opts to edit a file using open with system editor or open with a custom editor, the filename is passed directly into a command line without sanitization. A malicious actor controlling the SSH server or user OS can exploit this by crafting a filename containing shell metacharacters. If a victim subsequently attempts to edit this file, the injected commands are executed on their machine with the user's privileges. This could allow the attacker to run arbitrary code, install malware, or move laterally within the network. This issue has been patched in version 3.7.9."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-78","description":"CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-88","description":"CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-08T02:55:51.285Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/electerm/electerm/security/advisories/GHSA-q4p8-8j9m-8hxj","tags":["x_refsource_CONFIRM"],"url":"https://github.com/electerm/electerm/security/advisories/GHSA-q4p8-8j9m-8hxj"},{"name":"https://github.com/electerm/electerm/commit/24ce7103e264cffe6eb5476c0506a2379e6f8333","tags":["x_refsource_MISC"],"url":"https://github.com/electerm/electerm/commit/24ce7103e264cffe6eb5476c0506a2379e6f8333"},{"name":"https://github.com/electerm/electerm/releases/tag/v3.7.9","tags":["x_refsource_MISC"],"url":"https://github.com/electerm/electerm/releases/tag/v3.7.9"}],"source":{"advisory":"GHSA-q4p8-8j9m-8hxj","discovery":"UNKNOWN"},"title":"electerm: RCE via malicious SSH server filename in openFileWithEditor"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-43943","datePublished":"2026-05-08T02:55:51.285Z","dateReserved":"2026-05-04T16:59:09.090Z","dateUpdated":"2026-05-08T02:55:51.285Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-08 04:16:23","lastModifiedDate":"2026-05-08 04:16:23","problem_types":["CWE-78","CWE-88","CWE-78 CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","CWE-88 CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"43943","Ordinal":"1","Title":"electerm: RCE via malicious SSH server filename in openFileWithE","CVE":"CVE-2026-43943","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"43943","Ordinal":"1","NoteData":"electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. Prior to version 3.7.9, a code execution (RCE) vulnerability exists in electerm's SFTP open with system editor or \"Edit with custom editor\" feature. When a user opts to edit a file using open with system editor or open with a custom editor, the filename is passed directly into a command line without sanitization. A malicious actor controlling the SSH server or user OS can exploit this by crafting a filename containing shell metacharacters. If a victim subsequently attempts to edit this file, the injected commands are executed on their machine with the user's privileges. This could allow the attacker to run arbitrary code, install malware, or move laterally within the network. This issue has been patched in version 3.7.9.","Type":"Description","Title":"electerm: RCE via malicious SSH server filename in openFileWithE"}]}}}