Cyber Posture

CVE-2026-41500

CriticalRCE

Published: 08 May 2026

Published
08 May 2026
Modified
08 May 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0075 73.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-41500 is a critical-severity Command Injection (CWE-77) vulnerability in Electerm Project Electerm. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Unix Shell (T1059.004); ranked in the top 26.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Unix Shell (T1059.004).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Command injection in runMac() directly enables arbitrary Unix shell command execution via exec().

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. Prior to version 3.3.8, a command injection vulnerability exists in github.com/elcterm/electerm/npm/install.js:150. The runMac() function appends attacker-controlled remote releaseInfo.name directly into an exec("open ...") command without validation. This issue has been patched in version 3.3.8.

Deeper analysisAI

Automated synthesis unavailable for this CVE.

Details

CWE(s)

Affected Products

electerm project
electerm
≤ 3.3.8

CVEs Like This One

CVE-2026-41501Same product: Electerm Project Electerm
CVE-2026-43943Same product: Electerm Project Electerm
CVE-2026-43940Same product: Electerm Project Electerm
CVE-2026-43944Same product: Electerm Project Electerm
CVE-2026-43941Same product: Electerm Project Electerm
CVE-2025-50428Shared CWE-77
CVE-2025-25743Shared CWE-77
CVE-2025-59046Shared CWE-77
CVE-2024-43028Shared CWE-77
CVE-2026-31175Shared CWE-77

References