Vulnerability Description
Electron Capture facilitates video playback for screen-sharing and capture. In versions 2.19.1 and below, the elecap app on macOS allows local unprivileged users to bypass macOS TCC privacy protections by enabling ELECTRON_RUN_AS_NODE. This environment variable allows arbitrary Node.js code to be executed via the -e flag, which runs inside the main Electron context, inheriting any previously granted TCC entitlements (such as access to Documents, Downloads, etc.). This issue is fixed in version 2.20.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Electroncapture | Electron Capture | < 2.20.0 |
Related Weaknesses (CWE)
References
- https://github.com/steveseguin/electroncapture/commit/3837f54e75911bb99fa45cfa13Patch
- https://github.com/steveseguin/electroncapture/releases/tag/2.20.0Release Notes
- https://github.com/steveseguin/electroncapture/security/advisories/GHSA-8849-p3jExploitVendor Advisory
- https://github.com/steveseguin/electroncapture/security/advisories/GHSA-8849-p3jExploitVendor Advisory
FAQ
What is CVE-2025-54871?
CVE-2025-54871 is a vulnerability with a CVSS score of 5.5 (MEDIUM). Electron Capture facilitates video playback for screen-sharing and capture. In versions 2.19.1 and below, the elecap app on macOS allows local unprivileged users to bypass macOS TCC privacy protection...
How severe is CVE-2025-54871?
CVE-2025-54871 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-54871?
Check the references section above for vendor advisories and patch information. Affected products include: Electroncapture Electron Capture.