PT-2026-30000 · Npm · Electron

Published

2026-04-03

·

Updated

2026-04-03

·

CVE-2026-34770

CVSS v3.1

7.0

High

AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Impact

Apps that use the powerMonitor module may be vulnerable to a use-after-free. After the native PowerMonitor object is garbage-collected, the associated OS-level resources (a message window on Windows, a shutdown handler on macOS) retain dangling references. A subsequent session-change event (Windows) or system shutdown (macOS) dereferences freed memory, which may lead to a crash or memory corruption.
All apps that access powerMonitor events (suspend, resume, lock-screen, etc.) are potentially affected. The issue is not directly renderer-controllable.

Workarounds

There are no app side workarounds, you must update to a patched version of Electron.

Fixed Versions

  • 41.0.0-beta.8
  • 40.8.0
  • 39.8.1
  • 38.8.6

For more information

If there are any questions or comments about this advisory, please email security@electronjs.org

Fix

Use After Free

Weakness Enumeration

Related Identifiers

CVE-2026-34770
GHSA-JJP3-MQ3X-295M

Affected Products

Electron