electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. In versions 3.8.15 and prior, Electerm's terminal hyperlink handler passes any URL clicked in the terminal directly to shell.openExternal without any protocol validation. An attacker who controls terminal output (e.g., via a malicious SSH server, compromised remote host, or malicious plugin rendering terminal content) can thus achieve arbitrary code execution or local file access on the victim's machine, requiring only that the victim clicks a displayed link. At time of publication, there are no publicly available patches.
Metrics
Affected Vendors & Products
References
History
Mon, 11 May 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Electerm
Electerm electerm |
|
| Vendors & Products |
Electerm
Electerm electerm |
Fri, 08 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Electerm Project
Electerm Project electerm |
|
| CPEs | cpe:2.3:a:electerm_project:electerm:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Electerm Project
Electerm Project electerm |
Fri, 08 May 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. In versions 3.8.15 and prior, Electerm's terminal hyperlink handler passes any URL clicked in the terminal directly to shell.openExternal without any protocol validation. An attacker who controls terminal output (e.g., via a malicious SSH server, compromised remote host, or malicious plugin rendering terminal content) can thus achieve arbitrary code execution or local file access on the victim's machine, requiring only that the victim clicks a displayed link. At time of publication, there are no publicly available patches. | |
| Title | Unvalidated shell.openExternal in electerm allows arbitrary protocol execution via terminal link click | |
| Weaknesses | CWE-601 CWE-88 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-05-08T03:01:12.461Z
Updated: 2026-05-08T21:28:44.766Z
Reserved: 2026-05-04T16:59:09.090Z
Link: CVE-2026-43941
Updated: 2026-05-08T14:34:52.110Z
Status : Analyzed
Published: 2026-05-08T04:16:23.260
Modified: 2026-05-08T19:17:30.757
Link: CVE-2026-43941
No data.