Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. In versions below 35.7.5, 36.0.0-alpha.1 through 36.8.0, 37.0.0-alpha.1 through 37.3.1 and 38.0.0-alpha.1 through 38.0.0-beta.6, ASAR Integrity Bypass via resource modification. This only impacts apps that have the embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses enabled. Apps without these fuses enabled are not impacted. This issue is fixed in versions 35.7.5, 36.8.1, 37.3.1 and 38.0.0-beta.6.
PUBLISHED5.1CWE-94CWE-829
Electron is vulnerable to Code Injection via resource modification
Problem type
- CWE-94: Improper Control of Generation of Code ('Code Injection')
- CWE-829: Inclusion of Functionality from Untrusted Control Sphere
Affected products
electron
electron
< 35.7.5 - AFFECTED
>= 36.0.0-alpha.1, < 36.8.1 - AFFECTED
>= 37.0.0-alpha.1, < 37.3.1 - AFFECTED
>= 38.0.0-alpha.1, < 38.0.0-beta.6 - AFFECTED
References
https://github.com/electron/electron/security/advisories/GHSA-vmqv-hx8q-j7mg
https://github.com/electron/electron/security/advisories/GHSA-vmqv-hx8q-j7mg
https://github.com/electron/electron/pull/48101
https://github.com/electron/electron/pull/48101
https://github.com/electron/electron/pull/48102
https://github.com/electron/electron/pull/48102
https://github.com/electron/electron/pull/48103
https://github.com/electron/electron/pull/48103
https://github.com/electron/electron/pull/48104
https://github.com/electron/electron/pull/48104
https://github.com/electron/electron/commit/23a02934510fcf951428e14573d9b2d2a3c4f28b
https://github.com/electron/electron/commit/23a02934510fcf951428e14573d9b2d2a3c4f28b
https://github.com/electron/electron/commit/2e5a0b7220ebf955c6785cc5adb2e2b1cf77dac1
https://github.com/electron/electron/commit/2e5a0b7220ebf955c6785cc5adb2e2b1cf77dac1
https://github.com/electron/electron/commit/3f92511cdecc39f46b0e86cce40a0c691e301c9d
https://github.com/electron/electron/commit/3f92511cdecc39f46b0e86cce40a0c691e301c9d
https://github.com/electron/electron/commit/fdf29ce83870109d403f5c23ae529dbd0e8f4fee
https://github.com/electron/electron/commit/fdf29ce83870109d403f5c23ae529dbd0e8f4fee
JSON source
Click to expand
{ "dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2025-55305", "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "dateUpdated": "2025-09-04T23:05:07.274Z", "dateReserved": "2025-08-12T16:15:30.239Z", "datePublished": "2025-09-04T23:05:07.274Z", "state": "PUBLISHED" }, "containers": { "cna": { "providerMetadata": { "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M", "dateUpdated": "2025-09-04T23:05:07.274Z" }, "title": "Electron is vulnerable to Code Injection via resource modification", "descriptions": [ { "lang": "en", "value": "Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. In versions below 35.7.5, 36.0.0-alpha.1 through 36.8.0, 37.0.0-alpha.1 through 37.3.1 and 38.0.0-alpha.1 through 38.0.0-beta.6, ASAR Integrity Bypass via resource modification. This only impacts apps that have the embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses enabled. Apps without these fuses enabled are not impacted. This issue is fixed in versions 35.7.5, 36.8.1, 37.3.1 and 38.0.0-beta.6." } ], "affected": [ { "vendor": "electron", "product": "electron", "versions": [ { "version": "< 35.7.5", "status": "affected" }, { "version": ">= 36.0.0-alpha.1, < 36.8.1", "status": "affected" }, { "version": ">= 37.0.0-alpha.1, < 37.3.1", "status": "affected" }, { "version": ">= 38.0.0-alpha.1, < 38.0.0-beta.6", "status": "affected" } ] } ], "problemTypes": [ { "descriptions": [ { "lang": "en", "description": "CWE-94: Improper Control of Generation of Code ('Code Injection')", "cweId": "CWE-94", "type": "CWE" } ] }, { "descriptions": [ { "lang": "en", "description": "CWE-829: Inclusion of Functionality from Untrusted Control Sphere", "cweId": "CWE-829", "type": "CWE" } ] } ], "references": [ { "url": "https://github.com/electron/electron/security/advisories/GHSA-vmqv-hx8q-j7mg", "name": "https://github.com/electron/electron/security/advisories/GHSA-vmqv-hx8q-j7mg", "tags": [ "x_refsource_CONFIRM" ] }, { "url": "https://github.com/electron/electron/pull/48101", "name": "https://github.com/electron/electron/pull/48101", "tags": [ "x_refsource_MISC" ] }, { "url": "https://github.com/electron/electron/pull/48102", "name": "https://github.com/electron/electron/pull/48102", "tags": [ "x_refsource_MISC" ] }, { "url": "https://github.com/electron/electron/pull/48103", "name": "https://github.com/electron/electron/pull/48103", "tags": [ "x_refsource_MISC" ] }, { "url": "https://github.com/electron/electron/pull/48104", "name": "https://github.com/electron/electron/pull/48104", "tags": [ "x_refsource_MISC" ] }, { "url": "https://github.com/electron/electron/commit/23a02934510fcf951428e14573d9b2d2a3c4f28b", "name": "https://github.com/electron/electron/commit/23a02934510fcf951428e14573d9b2d2a3c4f28b", "tags": [ "x_refsource_MISC" ] }, { "url": "https://github.com/electron/electron/commit/2e5a0b7220ebf955c6785cc5adb2e2b1cf77dac1", "name": "https://github.com/electron/electron/commit/2e5a0b7220ebf955c6785cc5adb2e2b1cf77dac1", "tags": [ "x_refsource_MISC" ] }, { "url": "https://github.com/electron/electron/commit/3f92511cdecc39f46b0e86cce40a0c691e301c9d", "name": "https://github.com/electron/electron/commit/3f92511cdecc39f46b0e86cce40a0c691e301c9d", "tags": [ "x_refsource_MISC" ] }, { "url": "https://github.com/electron/electron/commit/fdf29ce83870109d403f5c23ae529dbd0e8f4fee", "name": "https://github.com/electron/electron/commit/fdf29ce83870109d403f5c23ae529dbd0e8f4fee", "tags": [ "x_refsource_MISC" ] } ], "metrics": [ { "cvssV3_1": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM" } } ] } } }