Cyber Posture

CVE-2026-34779

Medium

Published: 04 April 2026

Published
04 April 2026
Modified
14 April 2026
KEV Added
Patch
CVSS Score 6.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L
EPSS Score 0.0001 1.1th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-34779 is a medium-severity OS Command Injection (CWE-78) vulnerability in Electronjs Electron. Its CVSS base score is 6.5 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique AppleScript (T1059.002); ranked at the 1.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to AppleScript (T1059.002). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely patching of the vulnerable Electron versions (prior to 38.8.6, 39.8.1, 40.8.0, 41.0.0-beta.8) to remediate the AppleScript injection flaw.

detect

Enables automated scanning to identify systems and applications using vulnerable Electron versions affected by this macOS-specific path handling issue.

prevent

Addresses the CWE-78 OS command injection root cause by enforcing validation of crafted application bundle paths before AppleScript execution in Electron apps.

MITRE ATT&CK Enterprise TechniquesAI

T1059.002 AppleScript Execution
Adversaries may abuse AppleScript for execution.
Why these techniques?

The vulnerability enables arbitrary AppleScript execution via flawed path handling in the app.moveToApplicationsFolder() API (CWE-78 OS Command Injection), directly facilitating T1059.002.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8, on macOS, app.moveToApplicationsFolder() used an AppleScript fallback path that did not properly handle certain characters in the application…

more

bundle path. Under specific conditions, a crafted launch path could lead to arbitrary AppleScript execution when the user accepted the move-to-Applications prompt. Apps are only affected if they call app.moveToApplicationsFolder(). Apps that do not use this API are not affected. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8.

Deeper analysisAI

CVE-2026-34779 is a vulnerability in the Electron framework, which enables development of cross-platform desktop applications using JavaScript, HTML, and CSS. On macOS, versions prior to 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8 are affected when applications invoke the app.moveToApplicationsFolder() API. This method employs an AppleScript fallback that inadequately handles certain characters in the application bundle path, potentially enabling arbitrary AppleScript execution under specific conditions. Applications not using this API remain unaffected. The issue is classified under CWE-78 (OS Command Injection) with a CVSS v3.1 base score of 6.5 (AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L).

Exploitation requires local access (AV:L) with no privileges (PR:N), high attack complexity (AC:H), and user interaction (UI:R), such as accepting a move-to-Applications prompt. An attacker could craft a malicious launch path for the application, leveraging the flawed AppleScript handling to execute arbitrary commands on the system. Successful exploitation yields high impacts on confidentiality and integrity (C:H/I:H), with low availability impact (A:L), potentially allowing data exfiltration, modification, or other system compromise depending on the executed AppleScript.

The Electron security advisory (GHSA-5rqw-r77c-jp79) confirms patches in versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8, recommending immediate upgrades for affected applications. Developers should verify usage of app.moveToApplicationsFolder() and apply the fixes to mitigate risks on macOS deployments.

Details

CWE(s)

Affected Products

electronjs
electron
41.0.0 · ≤ 38.8.6 · 39.0.0 — 39.8.1 · 40.0.0 — 40.8.0

CVEs Like This One

CVE-2026-34773Same product: Electronjs Electron
CVE-2026-34770Same product: Electronjs Electron
CVE-2026-34768Same product: Electronjs Electron
CVE-2026-34780Same product: Electronjs Electron
CVE-2026-34775Same product: Electronjs Electron
CVE-2026-34771Same product: Electronjs Electron
CVE-2026-34765Same product: Electronjs Electron
CVE-2026-34774Same product: Electronjs Electron
CVE-2026-34772Same product: Electronjs Electron
CVE-2026-34769Same product: Electronjs Electron

References