On macOS and Linux, apps that call app.requestSingleInstanceLock() were vulnerable to an out-of-bounds heap read when parsing a crafted second-instance message. Leaked memory could be delivered to the app's second-instance event handler.
This issue is limited to processes running as the same user as the Electron app.
Apps that do not call app.requestSingleInstanceLock() are not affected. Windows is not affected by this issue.
There are no app side workarounds, developers must update to a patched version of Electron.
41.0.040.8.139.8.138.8.6If there are any questions or comments about this advisory, please email security@electronjs.org
{
"nvd_published_at": "2026-04-04T00:16:18Z",
"severity": "MODERATE",
"github_reviewed": true,
"cwe_ids": [
"CWE-125"
],
"github_reviewed_at": "2026-04-03T02:43:59Z"
}