Loading HuntDB...

GHSA-mpjm-v997-c4h4

GitHub Security Advisory

Electron's sandboxed renderers can obtain thumbnails of arbitrary files through the nativeImage API

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

### Impact
This vulnerability allows a sandboxed renderer to request a "thumbnail" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases.

All current stable versions of Electron are affected.

### Patches
This was fixed with #30728, and the following Electron versions contain the fix:

- 15.0.0-alpha.10
- 14.0.0
- 13.3.0
- 12.1.0
- 11.5.0

### Workarounds
If your app enables `contextIsolation`, this vulnerability is significantly more difficult for an attacker to exploit.

Further, if your app does not depend on the `createThumbnailFromPath` API, then you can simply disable the functionality. In the main process, before the 'ready' event:
```js
delete require('electron').nativeImage.createThumbnailFromPath
```

### For more information
If you have any questions or comments about this advisory, email us at [[email protected]](mailto:[email protected]).

Affected Packages

npm electron
Affected versions: 0 (fixed in 11.5.0)
npm electron
Affected versions: 12.0.0 (fixed in 12.1.0)
npm electron
Affected versions: 13.0.0 (fixed in 13.3.0)

Related CVEs

Key Information

GHSA ID
GHSA-mpjm-v997-c4h4
Published
October 12, 2021 9:59 PM
Last Modified
August 11, 2022 4:56 PM
CVSS Score
5.0 /10
Primary Ecosystem
npm
Primary Package
electron
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 12, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.