Home

Description

soundcloud-rpc is a SoundCloud Client with Discord Rich Presence, Dark Mode, Last.fm and AdBlock support. Prior to 0.1.8, a track title containing an HTML payload executed locally in the Electron app. This means attacker-controlled SoundCloud track metadata can lead to local command execution on the user's machine. The application exposes a preload API (window.soundcloudAPI.sendTrackUpdate) to the remote SoundCloud page. Track metadata from SoundCloud is trusted and forwarded through IPC into the Electron main process. The app later renders that metadata as raw HTML inside privileged Electron views that have Node.js integration enabled. This vulnerability is fixed in 0.1.8.

PUBLISHED Reserved 2026-05-06 | Published 2026-05-14 | Updated 2026-05-14 | Assigner GitHub_M




CRITICAL: 9.6CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Problem types

CWE-20: Improper Input Validation

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94: Improper Control of Generation of Code ('Code Injection')

CWE-862: Missing Authorization

Product status

< 0.1.8
affected

References

github.com/...ud-rpc/security/advisories/GHSA-p37x-32p8-445f exploit

github.com/...ud-rpc/security/advisories/GHSA-p37x-32p8-445f

cve.org (CVE-2026-44482)

nvd.nist.gov (CVE-2026-44482)

Download JSON