PT-2026-29997 · Npm · Electron
Published
2026-04-03
·
Updated
2026-04-03
·
CVE-2026-34767
CVSS v3.1
5.9
Medium
| AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N |
Impact
Apps that register custom protocol handlers via
protocol.handle() / protocol.registerSchemesAsPrivileged() or modify response headers via webRequest.onHeadersReceived may be vulnerable to HTTP response header injection if attacker-controlled input is reflected into a response header name or value.An attacker who can influence a header value may be able to inject additional response headers, affecting cookies, content security policy, or cross-origin access controls.
Apps that do not reflect external input into response headers are not affected.
Workarounds
Validate or sanitize any untrusted input before including it in a response header name or value.
Fixed Versions
41.0.340.8.339.8.338.8.6
For more information
If there are any questions or comments about this advisory, send an email to security@electronjs.org
Fix
Special Elements Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Electron