CVE-2026-43944 PUBLISHED

electerm: dangerous code can be run through links or command line

Assigner: GitHub_M
Reserved: 04.05.2026 Published: 08.05.2026 Updated: 08.05.2026

electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. From versions 3.0.6 to before 3.8.15, electerm is vulnerable to arbitrary local code execution via deep links, CLI --opts, or crafted shortcuts. Exploit requires clicking a crafted electerm://... link or opening a crafted shortcut/command that launches electerm with attacker-controlled opts. This issue has been patched in version 3.8.15.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS Score: 9.4

Product Status

Vendor electerm
Product electerm
Versions
  • Version >= 3.0.6, < 3.8.15 is affected

References

Problem Types

  • CWE-20: Improper Input Validation CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE
  • CWE-829: Inclusion of Functionality from Untrusted Control Sphere CWE