CVE-2026-34779 PUBLISHED

Electron: AppleScript injection in app.moveToApplicationsFolder on macOS

Assigner: GitHub_M
Reserved: 30.03.2026 Published: 04.04.2026 Updated: 04.04.2026

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8, on macOS, app.moveToApplicationsFolder() used an AppleScript fallback path that did not properly handle certain characters in the application bundle path. Under specific conditions, a crafted launch path could lead to arbitrary AppleScript execution when the user accepted the move-to-Applications prompt. Apps are only affected if they call app.moveToApplicationsFolder(). Apps that do not use this API are not affected. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8.

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L
CVSS Score: 6.5

Product Status

Vendor electron
Product electron
Versions
  • Version < 38.8.6 is affected
  • Version >= 39.0.0-alpha.1, < 39.8.1 is affected
  • Version >= 40.0.0-alpha.1, < 40.8.0 is affected
  • Version >= 41.0.0-alpha.1, < 41.0.0-beta.8 is affected

References

Problem Types

  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE