CVE-2022-36077
JavaScript vulnerability analysis and mitigation

Overview

The Electron framework, which enables writing cross-platform desktop applications using JavaScript, HTML, and CSS, was found to contain a sensitive information exposure vulnerability (CVE-2022-36077). The vulnerability was discovered in versions prior to 21.0.0-beta.1, 20.0.1, 19.0.11, and 18.3.7. When following a redirect, Electron delayed a check for redirecting to file:// URLs from other schemes, potentially exposing sensitive information (GitHub Advisory, Debian Tracker).

Technical details

The vulnerability stems from a delayed security check when handling redirects to file:// URLs from other schemes. While the contents of the file remain inaccessible to the renderer following the redirect, the security risk arises specifically on Windows systems. When the redirect target is an SMB URL (e.g., file://some.website.com/), Windows may attempt NTLM authentication, potentially exposing hashed credentials. The vulnerability has been assigned a CVSS v3.1 base score of 5.4 (Moderate), with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L (GitHub Advisory).

Impact

The primary impact of this vulnerability is the potential exposure of hashed SMB credentials on Windows systems. When exploited, the vulnerability could lead to the transmission of hashed credentials during NTLM authentication attempts to malicious SMB servers (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Electron versions 21.0.0-beta.1, 20.0.1, 19.0.11, and 18.3.7. For users unable to upgrade, a workaround is available by implementing a check in the WebContents.on('will-redirect') event to prevent redirects to file:// URLs. This can be done by adding an event listener that prevents such redirects for all WebContents (GitHub Advisory, Debian Tracker).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65959HIGH8.7
  • JavaScriptJavaScript
  • open-webui
NoYesDec 04, 2025
CVE-2025-66032HIGH8.7
  • JavaScriptJavaScript
  • @anthropic-ai/claude-code
NoYesDec 03, 2025
CVE-2025-65945HIGH7.5
  • JavaScriptJavaScript
  • jws
NoYesDec 04, 2025
CVE-2025-66404MEDIUM6.4
  • JavaScriptJavaScript
  • mcp-server-kubernetes
NoYesDec 03, 2025
CVE-2025-66479LOW1.8
  • JavaScriptJavaScript
  • @anthropic-ai/sandbox-runtime
NoYesDec 04, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management