Electron: Service worker can spoof executeJavaScript IPC replies
Package
Affected versions
< 38.8.6
>= 39.0.0-alpha.1, < 39.8.1
>= 40.0.0-alpha.1, < 40.8.1
>= 41.0.0-alpha.1, < 41.0.0
Patched versions
38.8.6
39.8.1
40.8.1
41.0.0
Description
Published to the GitHub Advisory Database
Apr 3, 2026
Reviewed
Apr 3, 2026
Published by the National Vulnerability Database
Apr 4, 2026
Last updated
Apr 6, 2026
Impact
A service worker running in a session could spoof reply messages on the internal IPC channel used by
webContents.executeJavaScript()and related methods, causing the main-process promise to resolve with attacker-controlled data.Apps are only affected if they have service workers registered and use the result of
webContents.executeJavaScript()(orwebFrameMain.executeJavaScript()) in security-sensitive decisions.Workarounds
Do not trust the return value of
webContents.executeJavaScript()for security decisions. Use dedicated, validated IPC channels for security-relevant communication with renderers.Fixed Versions
41.0.040.8.139.8.138.8.6For more information
If there are any questions or comments about this advisory, please email security@electronjs.org
References