Description
In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass. Code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using both `contextIsolation` and `contextBridge` are affected. This is fixed in versions 9.0.0-beta.21, 8.2.4 and 7.2.4.
Remediation
References
https://github.com/electron/electron/security/advisories/GHSA-h9jc-284h-533g
https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824
Related Vulnerabilities
CVE-2020-2142 Vulnerability in maven package org.jenkins-ci.plugins:p4
CVE-2023-26488 Vulnerability in npm package @openzeppelin/contracts
CVE-2023-5245 Vulnerability in maven package ml.combust.bundle:bundle-ml_2.12
CVE-2020-17518 Vulnerability in maven package org.apache.flink:flink-runtime_2.12
CVE-2022-45394 Vulnerability in maven package org.jenkins-ci.plugins:delete-log-plugin