-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| electron-updater | npm | <= 6.3.0-alpha.5 | 6.3.0-alpha.6 |
The vulnerability stems from the verifySignature function's execution flow: 1) It constructs a PowerShell command with user-controlled tempUpdateFile path, 2) Executes it through cmd.exe which expands environment variables, 3) Previously lacked validation that the authenticated file path (data.Path) matched the intended update file. The patch added path comparison logic to this function, confirming it was the missing security check. While execFile is involved, the root vulnerability resides in verifySignature's validation logic.
KEV Misses 88% of Exploited CVEs- Get the report