CVE-2025-54871

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-54871
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-54871.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-54871
Related
  • GHSA-8849-p3j4-jq4h
Published
2025-08-05T01:15:43Z
Modified
2025-08-05T20:51:39.748424Z
Summary
[none]
Details

Electron Capture facilitates video playback for screen-sharing and capture. In versions 2.19.1 and below, the elecap app on macOS allows local unprivileged users to bypass macOS TCC privacy protections by enabling ELECTRONRUNAS_NODE. This environment variable allows arbitrary Node.js code to be executed via the -e flag, which runs inside the main Electron context, inheriting any previously granted TCC entitlements (such as access to Documents, Downloads, etc.). This issue is fixed in version 2.20.0.

References

Affected packages

Git / github.com/steveseguin/electroncapture

Affected ranges

Type
GIT
Repo
https://github.com/steveseguin/electroncapture
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

1.*

1.0.6
1.0.7
1.0.8
1.0.9
1.02
1.03
1.05
1.1.0
1.1.1
1.1.2
1.1.3
1.2.0
1.3.0
1.3.x
1.4.0
1.4.1
1.4.2
1.5.0
1.5.1
1.5.2
1.6.0
1.6.1
1.6.8
1.6.9
1.7.0

2.*

2.0.0
2.0.1
2.1.0
2.1.1
2.1.2
2.1.3
2.10.0
2.11.0
2.12.0
2.12.1
2.13.0
2.13.1
2.14.0
2.14.1
2.15.0
2.15.1
2.15.2
2.15.3
2.15.5
2.16.0
2.16.1
2.16.2
2.17.0
2.17.1
2.17.1.1
2.17.10
2.17.11
2.17.2
2.17.3
2.17.4
2.17.5
2.17.6
2.17.7
2.17.8
2.17.9
2.18.0
2.18.1
2.18.7
2.18.8
2.18.9
2.18.x
2.19.0
2.19.1
2.2.0
2.3.0
2.4.0
2.4.1
2.5.0
2.6.0
2.6.1
2.6.2
2.7.0
2.8.0
2.9.0