Bug 2455020 (CVE-2026-34780) - CVE-2026-34780 electron: Electron: Context Isolation bypass via VideoFrame object transfer
Summary: CVE-2026-34780 electron: Electron: Context Isolation bypass via VideoFrame ob...
Keywords:
Status: NEW
Alias: CVE-2026-34780
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2455448 2455449
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-04 01:01 UTC by OSIDB Bzimport
Modified: 2026-04-06 16:49 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-04 01:01:15 UTC
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. From versions 39.0.0-alpha.1 to before 39.8.0, 40.0.0-alpha.1 to before 40.7.0, and 41.0.0-alpha.1 to before 41.0.0-beta.8, apps that pass VideoFrame objects (from the WebCodecs API) across the contextBridge are vulnerable to a context isolation bypass. An attacker who can execute JavaScript in the main world (for example, via XSS) can use a bridged VideoFrame to gain access to the isolated world, including any Node.js APIs exposed to the preload script. Apps are only affected if a preload script returns, resolves, or passes a VideoFrame object to the main world via contextBridge.exposeInMainWorld(). Apps that do not bridge VideoFrame objects are not affected. This issue has been patched in versions 39.8.0, 40.7.0, and 41.0.0-beta.8.


Note You need to log in before you can comment on or make changes to this bug.