cve-2025-55305
Vulnerability from cvelistv5
Published
2025-09-04 23:05
Modified
2025-09-05 15:44
Severity ?
EPSS score ?
Summary
Electron is vulnerable to Code Injection via resource modification
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-55305", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-05T15:44:19.972893Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-05T15:44:54.628Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "electron", "vendor": "electron", "versions": [ { "status": "affected", "version": "\u003c 35.7.5" }, { "status": "affected", "version": "\u003e= 36.0.0-alpha.1, \u003c 36.8.1" }, { "status": "affected", "version": "\u003e= 37.0.0-alpha.1, \u003c 37.3.1" }, { "status": "affected", "version": "\u003e= 38.0.0-alpha.1, \u003c 38.0.0-beta.6" } ] } ], "descriptions": [ { "lang": "en", "value": "Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. In versions below 35.7.5, 36.0.0-alpha.1 through 36.8.0, 37.0.0-alpha.1 through 37.3.1 and 38.0.0-alpha.1 through 38.0.0-beta.6, ASAR Integrity Bypass via resource modification. This only impacts apps that have the embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses enabled. Apps without these fuses enabled are not impacted. This issue is fixed in versions 35.7.5, 36.8.1, 37.3.1 and 38.0.0-beta.6." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-829", "description": "CWE-829: Inclusion of Functionality from Untrusted Control Sphere", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-04T23:05:07.274Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/electron/electron/security/advisories/GHSA-vmqv-hx8q-j7mg", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/electron/electron/security/advisories/GHSA-vmqv-hx8q-j7mg" }, { "name": "https://github.com/electron/electron/pull/48101", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/electron/electron/pull/48101" }, { "name": "https://github.com/electron/electron/pull/48102", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/electron/electron/pull/48102" }, { "name": "https://github.com/electron/electron/pull/48103", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/electron/electron/pull/48103" }, { "name": "https://github.com/electron/electron/pull/48104", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/electron/electron/pull/48104" }, { "name": "https://github.com/electron/electron/commit/23a02934510fcf951428e14573d9b2d2a3c4f28b", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/electron/electron/commit/23a02934510fcf951428e14573d9b2d2a3c4f28b" }, { "name": "https://github.com/electron/electron/commit/2e5a0b7220ebf955c6785cc5adb2e2b1cf77dac1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/electron/electron/commit/2e5a0b7220ebf955c6785cc5adb2e2b1cf77dac1" }, { "name": "https://github.com/electron/electron/commit/3f92511cdecc39f46b0e86cce40a0c691e301c9d", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/electron/electron/commit/3f92511cdecc39f46b0e86cce40a0c691e301c9d" }, { "name": "https://github.com/electron/electron/commit/fdf29ce83870109d403f5c23ae529dbd0e8f4fee", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/electron/electron/commit/fdf29ce83870109d403f5c23ae529dbd0e8f4fee" } ], "source": { "advisory": "GHSA-vmqv-hx8q-j7mg", "discovery": "UNKNOWN" }, "title": "Electron is vulnerable to Code Injection via resource modification" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-55305", "datePublished": "2025-09-04T23:05:07.274Z", "dateReserved": "2025-08-12T16:15:30.239Z", "dateUpdated": "2025-09-05T15:44:54.628Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-55305\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-09-04T23:15:33.520\",\"lastModified\":\"2025-09-05T17:47:10.303\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. In versions below 35.7.5, 36.0.0-alpha.1 through 36.8.0, 37.0.0-alpha.1 through 37.3.1 and 38.0.0-alpha.1 through 38.0.0-beta.6, ASAR Integrity Bypass via resource modification. This only impacts apps that have the embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses enabled. Apps without these fuses enabled are not impacted. This issue is fixed in versions 35.7.5, 36.8.1, 37.3.1 and 38.0.0-beta.6.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.3,\"impactScore\":4.7}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"},{\"lang\":\"en\",\"value\":\"CWE-829\"}]}],\"references\":[{\"url\":\"https://github.com/electron/electron/commit/23a02934510fcf951428e14573d9b2d2a3c4f28b\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/electron/electron/commit/2e5a0b7220ebf955c6785cc5adb2e2b1cf77dac1\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/electron/electron/commit/3f92511cdecc39f46b0e86cce40a0c691e301c9d\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/electron/electron/commit/fdf29ce83870109d403f5c23ae529dbd0e8f4fee\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/electron/electron/pull/48101\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/electron/electron/pull/48102\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/electron/electron/pull/48103\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/electron/electron/pull/48104\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/electron/electron/security/advisories/GHSA-vmqv-hx8q-j7mg\",\"source\":\"security-advisories@github.com\"}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.