Vulnerability Description
electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. From versions 3.0.6 to before 3.8.15, electerm is vulnerable to arbitrary local code execution via deep links, CLI --opts, or crafted shortcuts. Exploit requires clicking a crafted electerm://... link or opening a crafted shortcut/command that launches electerm with attacker-controlled opts. This issue has been patched in version 3.8.15.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Electerm Project | Electerm | >= 3.0.6, < 3.8.15 |
Related Weaknesses (CWE)
References
- https://github.com/electerm/electerm/commit/0599e67069b00e376a2e962649aaad6096e6
- https://github.com/electerm/electerm/commit/8a6a17951e96d715f5a231532bbd8303fe20Patch
- https://github.com/electerm/electerm/commit/a79e06f4a1f0ac6376c3d2411ef4690fa037Patch
- https://github.com/electerm/electerm/releases/tag/v3.8.15Release Notes
- https://github.com/electerm/electerm/security/advisories/GHSA-mpm8-cx2p-626qMitigationPatchVendor Advisory
FAQ
What is CVE-2026-43944?
CVE-2026-43944 is a vulnerability with a CVSS score of 9.6 (CRITICAL). electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. From versions 3.0.6 to before 3.8.15, electerm is vulnerable to arbitrary local code execution via deep links,...
How severe is CVE-2026-43944?
CVE-2026-43944 has been rated CRITICAL with a CVSS base score of 9.6/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-43944?
Check the references section above for vendor advisories and patch information. Affected products include: Electerm Project Electerm.