2025-09-04 23:5CVE-2025-55305GitHub_M
PUBLISHED5.1CWE-94CWE-829

Electron is vulnerable to Code Injection via resource modification

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. In versions below 35.7.5, 36.0.0-alpha.1 through 36.8.0, 37.0.0-alpha.1 through 37.3.1 and 38.0.0-alpha.1 through 38.0.0-beta.6, ASAR Integrity Bypass via resource modification. This only impacts apps that have the embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses enabled. Apps without these fuses enabled are not impacted. This issue is fixed in versions 35.7.5, 36.8.1, 37.3.1 and 38.0.0-beta.6.

Problem type

Affected products

electron

electron

< 35.7.5 - AFFECTED

>= 36.0.0-alpha.1, < 36.8.1 - AFFECTED

>= 37.0.0-alpha.1, < 37.3.1 - AFFECTED

>= 38.0.0-alpha.1, < 38.0.0-beta.6 - AFFECTED

References

JSON source

Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "cveMetadata": {
    "cveId": "CVE-2025-55305",
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "dateUpdated": "2025-09-04T23:05:07.274Z",
    "dateReserved": "2025-08-12T16:15:30.239Z",
    "datePublished": "2025-09-04T23:05:07.274Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M",
        "dateUpdated": "2025-09-04T23:05:07.274Z"
      },
      "title": "Electron is vulnerable to Code Injection via resource modification",
      "descriptions": [
        {
          "lang": "en",
          "value": "Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. In versions below 35.7.5, 36.0.0-alpha.1 through 36.8.0, 37.0.0-alpha.1 through 37.3.1 and 38.0.0-alpha.1 through 38.0.0-beta.6, ASAR Integrity Bypass via resource modification. This only impacts apps that have the embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses enabled. Apps without these fuses enabled are not impacted. This issue is fixed in versions 35.7.5, 36.8.1, 37.3.1 and 38.0.0-beta.6."
        }
      ],
      "affected": [
        {
          "vendor": "electron",
          "product": "electron",
          "versions": [
            {
              "version": "< 35.7.5",
              "status": "affected"
            },
            {
              "version": ">= 36.0.0-alpha.1, < 36.8.1",
              "status": "affected"
            },
            {
              "version": ">= 37.0.0-alpha.1, < 37.3.1",
              "status": "affected"
            },
            {
              "version": ">= 38.0.0-alpha.1, < 38.0.0-beta.6",
              "status": "affected"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-94: Improper Control of Generation of Code ('Code Injection')",
              "cweId": "CWE-94",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-829: Inclusion of Functionality from Untrusted Control Sphere",
              "cweId": "CWE-829",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://github.com/electron/electron/security/advisories/GHSA-vmqv-hx8q-j7mg",
          "name": "https://github.com/electron/electron/security/advisories/GHSA-vmqv-hx8q-j7mg",
          "tags": [
            "x_refsource_CONFIRM"
          ]
        },
        {
          "url": "https://github.com/electron/electron/pull/48101",
          "name": "https://github.com/electron/electron/pull/48101",
          "tags": [
            "x_refsource_MISC"
          ]
        },
        {
          "url": "https://github.com/electron/electron/pull/48102",
          "name": "https://github.com/electron/electron/pull/48102",
          "tags": [
            "x_refsource_MISC"
          ]
        },
        {
          "url": "https://github.com/electron/electron/pull/48103",
          "name": "https://github.com/electron/electron/pull/48103",
          "tags": [
            "x_refsource_MISC"
          ]
        },
        {
          "url": "https://github.com/electron/electron/pull/48104",
          "name": "https://github.com/electron/electron/pull/48104",
          "tags": [
            "x_refsource_MISC"
          ]
        },
        {
          "url": "https://github.com/electron/electron/commit/23a02934510fcf951428e14573d9b2d2a3c4f28b",
          "name": "https://github.com/electron/electron/commit/23a02934510fcf951428e14573d9b2d2a3c4f28b",
          "tags": [
            "x_refsource_MISC"
          ]
        },
        {
          "url": "https://github.com/electron/electron/commit/2e5a0b7220ebf955c6785cc5adb2e2b1cf77dac1",
          "name": "https://github.com/electron/electron/commit/2e5a0b7220ebf955c6785cc5adb2e2b1cf77dac1",
          "tags": [
            "x_refsource_MISC"
          ]
        },
        {
          "url": "https://github.com/electron/electron/commit/3f92511cdecc39f46b0e86cce40a0c691e301c9d",
          "name": "https://github.com/electron/electron/commit/3f92511cdecc39f46b0e86cce40a0c691e301c9d",
          "tags": [
            "x_refsource_MISC"
          ]
        },
        {
          "url": "https://github.com/electron/electron/commit/fdf29ce83870109d403f5c23ae529dbd0e8f4fee",
          "name": "https://github.com/electron/electron/commit/fdf29ce83870109d403f5c23ae529dbd0e8f4fee",
          "tags": [
            "x_refsource_MISC"
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L",
            "attackVector": "LOCAL",
            "attackComplexity": "LOW",
            "privilegesRequired": "LOW",
            "userInteraction": "REQUIRED",
            "scope": "UNCHANGED",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "availabilityImpact": "LOW",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM"
          }
        }
      ]
    }
  }
}

Mitre source

https://cveawg.mitre.org/api/cve/CVE-2025-55305