CVE-2026-43942
Last updated May 08, 2026 · Published May 08, 2026
Description
electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. In versions 3.8.15 and prior, the getConstants() IPC handler in src/app/lib/ipc-sync.js serialises the entire process.env object and sends it to the renderer. The data is stored as window.pre.env and is accessible from any JavaScript running in the renderer (e.g., via the DevTools console or a compromised webview context). An attacker who achieves any JavaScript execution within the renderer can trivially exfiltrate these secrets to a remote server, leading to cloud account compromise, supply chain attacks, and lateral movement. At time of publication, there are no publicly available patches.
Affected products
1 listed- electerm:electerm
Mappings
CWE
CAPEC
None listed.
Related
Training
- Logging and Detection EngineeringWriting logs that actually help you find attackers - structured, contextual, actionable.
- Data Protection and EncryptionEncryption at rest, in transit, and the practical choices developers actually make.
- Dependency and Supply Chain ManagementSBOMs, lock files, and surviving the next big supply chain attack.
CVE® content © MITRE Corporation. Licensed under the CVE Terms of Use. Terms
