Home

Description

electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. Prior to version 3.3.8, a command injection vulnerability exists in github.com/elcterm/electerm/npm/install.js:150. The runMac() function appends attacker-controlled remote releaseInfo.name directly into an exec("open ...") command without validation. This issue has been patched in version 3.3.8.

PUBLISHED Reserved 2026-04-20 | Published 2026-05-08 | Updated 2026-05-08 | Assigner GitHub_M




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')

Product status

< 3.3.8
affected

References

github.com/...ecterm/security/advisories/GHSA-wxw2-rwmh-vr8f

github.com/...ommit/59708b38c8a52f5db59d7d4eff98e31d573128ee

github.com/electerm/electerm/releases/tag/v3.3.8

cve.org (CVE-2026-41500)

nvd.nist.gov (CVE-2026-41500)

Download JSON