{
  "threat_severity" : "Important",
  "public_date" : "2026-04-03T23:33:55Z",
  "bugzilla" : {
    "description" : "Electron: Electron: Arbitrary code execution and security bypass via undocumented command-line switches",
    "id" : "2455004",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2455004"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.7",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
    "status" : "draft"
  },
  "cwe" : "CWE-88",
  "details" : [ "Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8, an undocumented commandLineSwitches webPreference allowed arbitrary switches to be appended to the renderer process command line. Apps that construct webPreferences by spreading untrusted configuration objects may inadvertently allow an attacker to inject switches that disable renderer sandboxing or web security controls. Apps are only affected if they construct webPreferences from external or untrusted input without an allowlist. Apps that use a fixed, hardcoded webPreferences object are not affected. This issue has been patched in versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8.", "A flaw was found in Electron, a framework for building desktop applications. This vulnerability arises from an undocumented `commandLineSwitches` webPreference that allows arbitrary command-line switches to be appended to the renderer process. A remote attacker could exploit this by providing malicious input to applications that construct `webPreferences` from untrusted sources. Successful exploitation could disable critical security controls like sandboxing, potentially leading to arbitrary code execution, privilege escalation, or sensitive information disclosure." ],
  "package_state" : [ {
    "product_name" : "Red Hat Build of Podman Desktop",
    "fix_state" : "Affected",
    "package_name" : "podman-desktop-macos-1-0",
    "cpe" : "cpe:/a:redhat:podman_desktop:1"
  }, {
    "product_name" : "Red Hat Build of Podman Desktop",
    "fix_state" : "Affected",
    "package_name" : "podman-desktop-windows-1-0",
    "cpe" : "cpe:/a:redhat:podman_desktop:1"
  }, {
    "product_name" : "Red Hat Build of Podman Desktop - Tech Preview",
    "fix_state" : "Affected",
    "package_name" : "rhdesktop/rh-podman-desktop-ext-openshift-local-rhel10",
    "cpe" : "cpe:/a:redhat:podman_desktop:0"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2026-34769\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-34769\nhttps://github.com/electron/electron/security/advisories/GHSA-9wfr-w7mm-pc7f" ],
  "name" : "CVE-2026-34769",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}