CVE-2025-55305
JavaScript vulnerability analysis and mitigation

Overview

CVE-2025-55305 affects Electron, a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. The vulnerability was discovered in September 2025 and affects versions below 35.7.5, 36.0.0-alpha.1 through 36.8.0, 37.0.0-alpha.1 through 37.3.1, and 38.0.0-alpha.1 through 38.0.0-beta.6. The issue involves an ASAR Integrity Bypass via resource modification, which only impacts applications that have both the embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses enabled (NVD, GitHub Advisory).

Technical details

The vulnerability allows attackers with local write access to the application's installation directory to tamper with files inside the resources folder, undermining the intended protections and allowing unauthorized changes to the application. The issue has been assigned a CVSS v3.1 base score of 6.1 (Medium) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L. The vulnerability is associated with CWE-94 (Improper Control of Generation of Code) and CWE-829 (Inclusion of Functionality from Untrusted Control Sphere) (Red Hat, GitHub Advisory).

Impact

The vulnerability only affects applications that have specific security features enabled (embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses). When exploited, it allows attackers to bypass ASAR integrity validation, potentially leading to unauthorized modifications of application resources. The impact is particularly significant for applications installed on filesystems where attackers have write access, such as the resources folder in Windows app installations (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in Electron versions 35.7.5, 36.8.1, 37.3.1, and 38.0.0-beta.6. There are no application-side workarounds available; users must update to a patched version of Electron to address the vulnerability (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65959HIGH8.7
  • JavaScriptJavaScript
  • open-webui
NoYesDec 04, 2025
CVE-2025-66032HIGH8.7
  • JavaScriptJavaScript
  • @anthropic-ai/claude-code
NoYesDec 03, 2025
CVE-2025-65945HIGH7.5
  • JavaScriptJavaScript
  • jws
NoYesDec 04, 2025
CVE-2025-66404MEDIUM6.4
  • JavaScriptJavaScript
  • mcp-server-kubernetes
NoYesDec 03, 2025
CVE-2025-66479LOW1.8
  • JavaScriptJavaScript
  • @anthropic-ai/sandbox-runtime
NoYesDec 04, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management