CVE-2026-34767

MEDIUM

Electron: HTTP Response Header Injection in custom protocol handlers and webRequest

Title source: cna
STIX 2.1

Description

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.3, 40.8.3, and 41.0.3, apps that register custom protocol handlers via protocol.handle() / protocol.registerSchemesAsPrivileged() or modify response headers via webRequest.onHeadersReceived may be vulnerable to HTTP response header injection if attacker-controlled input is reflected into a response header name or value. An attacker who can influence a header value may be able to inject additional response headers, affecting cookies, content security policy, or cross-origin access controls. Apps that do not reflect external input into response headers are not affected. This issue has been patched in versions 38.8.6, 39.8.3, 40.8.3, and 41.0.3.

Scores

CVSS v3 5.9
EPSS 0.0001
EPSS Percentile 1.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-113 CWE-74
Status published
Products (6)
electron/electron < 38.8.6
electron/electron >= 39.0.0-alpha.1, < 39.8.3
electron/electron >= 40.0.0-alpha.1, < 40.8.3
electron/electron >= 41.0.0-alpha.1, < 41.0.3
electronjs/electron < 38.8.6
npm/electron 0 - 38.8.6npm
Published Apr 04, 2026
Tracked Since Apr 04, 2026