On Windows, app.setLoginItemSettings({openAtLogin: true}) wrote the executable path to the Run registry key without quoting. If the app is installed to a path containing spaces, an attacker with write access to an ancestor directory may be able to cause a different executable to run at login instead of the intended app.
On a default Windows install, standard system directories are protected against writes by standard users, so exploitation typically requires a non-standard install location.
Install the application to a path without spaces, or to a location where all ancestor directories are protected against unauthorized writes.
41.0.0-beta.840.8.039.8.138.8.6If there are any questions or comments about this advisory, send an email to security@electronjs.org
{
"cwe_ids": [
"CWE-428"
],
"github_reviewed": true,
"nvd_published_at": null,
"severity": "LOW",
"github_reviewed_at": "2026-04-03T02:38:08Z"
}