{"id":"CVE-2018-1000006","details":"GitHub Electron versions 1.8.2-beta.3 and earlier, 1.7.10 and earlier, 1.6.15 and earlier has a vulnerability in the protocol handler, specifically Electron apps running on Windows 10, 7 or 2008 that register custom protocol handlers can be tricked in arbitrary command execution if the user clicks on a specially crafted URL. This has been fixed in versions 1.8.2-beta.4, 1.7.11, and 1.6.16.","aliases":["GHSA-w222-53c6-c86p"],"modified":"2026-03-15T14:29:13.402158Z","published":"2018-01-24T23:29:00.497Z","references":[{"type":"WEB","url":"https://medium.com/%40Wflki/exploiting-electron-rce-in-exodus-wallet-d9e6db13c374"},{"type":"WEB","url":"https://www.exploit-db.com/exploits/44357/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/102796"},{"type":"ADVISORY","url":"https://electronjs.org/blog/protocol-handler-fix"},{"type":"FIX","url":"https://github.com/electron/electron/releases/tag/v1.8.2-beta.4"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/exploits/43899/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/electron/electron","events":[{"introduced":"0"},{"last_affected":"378666668f49d3472ba7c456d97950e59ace082c"},{"introduced":"0"},{"last_affected":"5a44e7c0585be55fd32ff1992d11af7934d90eb2"},{"fixed":"a1f23064e193aa1629d743125a2ae1bc55085f99"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.7.10"},{"introduced":"0"},{"last_affected":"1.6.15"}]}}],"versions":["v0.1.0","v0.1.1","v0.1.2","v0.1.3","v0.1.4","v0.1.5","v0.1.6","v0.1.7","v0.1.8","v0.10.0","v0.10.1","v0.10.2","v0.10.3","v0.10.4","v0.10.5","v0.10.6","v0.10.7","v0.11.0","v0.11.1","v0.11.10","v0.11.2","v0.11.3","v0.11.4","v0.11.5","v0.11.6","v0.11.7","v0.11.8","v0.11.9","v0.12.0","v0.12.1","v0.12.2","v0.12.3","v0.12.4","v0.12.5","v0.12.6","v0.12.7","v0.13.0","v0.13.1","v0.13.2","v0.13.3","v0.14.0","v0.14.1","v0.14.2","v0.14.3","v0.15.0","v0.15.1","v0.15.2","v0.15.3","v0.15.4","v0.15.5","v0.15.6","v0.15.7","v0.15.8","v0.15.9","v0.16.0","v0.16.1","v0.16.2","v0.16.3","v0.17.0","v0.17.1","v0.17.2","v0.18.0","v0.18.1","v0.18.2","v0.19.0","v0.19.1","v0.19.2","v0.19.3","v0.19.4","v0.19.5","v0.2.0","v0.2.1","v0.20.0","v0.20.1","v0.20.2","v0.20.3","v0.20.4","v0.20.5","v0.20.6","v0.20.7","v0.20.8","v0.21.0","v0.21.1","v0.21.2","v0.21.3","v0.22.0","v0.22.1","v0.22.2","v0.22.3","v0.23.0","v0.24.0","v0.25.0","v0.25.1","v0.25.2","v0.25.3","v0.26.0","v0.26.1","v0.27.0","v0.27.1","v0.27.2","v0.27.3","v0.28.0","v0.28.1","v0.28.2","v0.28.3","v0.29.0","v0.29.1","v0.29.2","v0.3.0","v0.3.1","v0.3.2","v0.3.3","v0.3.4","v0.3.5","v0.30.0","v0.30.1","v0.30.2","v0.30.3","v0.30.4","v0.30.5","v0.31.0","v0.31.1","v0.31.2","v0.32.0","v0.32.1","v0.32.2","v0.32.3","v0.33.0","v0.33.1","v0.33.2","v0.33.3","v0.33.4","v0.33.5","v0.33.6","v0.33.7","v0.33.8","v0.33.9","v0.34.0","v0.34.1","v0.34.2","v0.34.3","v0.35.0","v0.35.1","v0.35.2","v0.35.3","v0.35.4","v0.36.0","v0.36.1","v0.36.10","v0.36.11","v0.36.2","v0.36.3","v0.36.4","v0.36.5","v0.36.6","v0.36.7","v0.36.8","v0.36.9","v0.37.0","v0.37.1","v0.37.2","v0.37.3","v0.37.4","v0.37.5","v0.37.6","v0.37.7","v0.37.8","v0.4.0","v0.4.2","v0.4.3","v0.4.4","v0.4.5","v0.4.6","v0.4.7","v0.4.8","v0.4.9","v0.5.0","v0.5.1","v0.5.2","v0.5.3","v0.5.4","v0.6.0","v0.6.1","v0.6.10","v0.6.11","v0.6.12","v0.6.2","v0.6.3","v0.6.4","v0.6.5","v0.6.6","v0.6.7","v0.6.8","v0.6.9","v0.7.0","v0.7.1","v0.7.2","v0.7.3","v0.7.4","v0.7.5","v0.7.6","v0.8.0","v0.8.1","v0.8.2","v0.8.3","v0.8.4","v0.8.5","v0.8.6","v0.8.7","v0.9.0","v0.9.1","v0.9.2","v0.9.3","v1.0.0","v1.0.1","v1.0.2","v1.1.0","v1.1.1","v1.1.2","v1.2.0","v1.2.1","v1.2.2","v1.2.3","v1.2.4","v1.2.5","v1.2.6","v1.2.7","v1.2.8","v1.3.0","v1.3.1","v1.3.2","v1.3.3","v1.3.4","v1.3.5","v1.3.6","v1.4.0","v1.4.1","v1.4.10","v1.4.11","v1.4.12","v1.4.13","v1.4.14","v1.4.15","v1.4.2","v1.4.3","v1.4.4","v1.4.5","v1.4.6","v1.4.7","v1.4.8","v1.4.9","v1.5.0","v1.5.1","v1.6.0","v1.6.1","v1.6.10","v1.6.11","v1.6.12","v1.6.13","v1.6.14","v1.6.15","v1.6.2","v1.6.3","v1.6.4","v1.6.5","v1.6.6","v1.6.7","v1.6.8","v1.6.9","v1.7.0","v1.7.1","v1.7.10","v1.7.2","v1.7.3","v1.7.4","v1.7.5","v1.7.6","v1.7.7","v1.7.8","v1.7.9"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"1.8.2-beta1"}]},{"events":[{"introduced":"0"},{"last_affected":"1.8.2-beta2"}]},{"events":[{"introduced":"0"},{"last_affected":"1.8.2-beta3"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1000006.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}