Renderers can obtain access to random bluetooth device without permission in Electron
Description
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability in versions prior to 17.0.0-alpha.6, 16.0.6, 15.3.5, 14.2.4, and 13.6.6 allows renderers to obtain access to a bluetooth device via the web bluetooth API if the app has not configured a custom select-bluetooth-device event handler. This has been patched and Electron versions 17.0.0-alpha.6, 16.0.6, 15.3.5, 14.2.4, and 13.6.6 contain the fix. Code from the GitHub Security Advisory can be added to the app to work around the issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Electron renderers can access Bluetooth devices without permission if no custom event handler is set; patched in recent versions.
Vulnerability
Electron versions prior to 17.0.0-alpha.6, 16.0.6, 15.3.5, 14.2.4, and 13.6.6 allow renderers to access Bluetooth devices via the Web Bluetooth API if the app has not configured a custom select-bluetooth-device event handler [1][4].
Exploitation
An attacker controlling a renderer process can trigger a Bluetooth device request. Without a custom event handler, the default behavior proceeds, granting access to a random Bluetooth device without user interaction or additional privileges [4].
Impact
Successful exploitation grants the renderer access to a random Bluetooth device, leading to potential information disclosure or control. The attacker cannot select a specific device [4].
Mitigation
Fixed in Electron versions 17.0.0-alpha.6, 16.0.6, 15.3.5, 14.2.4, and 13.6.6 [1][4]. As a workaround, apps can add an event listener to cancel the request by calling callback('') and event.preventDefault() [4].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
electronnpm | < 13.6.6 | 13.6.6 |
electronnpm | >= 14.0.0-beta.1, < 14.2.4 | 14.2.4 |
electronnpm | >= 15.0.0-beta.1, < 15.3.5 | 15.3.5 |
electronnpm | >= 16.0.0-beta.1, < 16.0.6 | 16.0.6 |
electronnpm | >= 17.0.0-alpha.1, < 17.0.0-alpha.6 | 17.0.0-alpha.6 |
Affected products
2- Range: < 13.6.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-3p22-ghq8-v749ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-21718ghsaADVISORY
- github.com/electron/electron/pull/32178ghsax_refsource_MISCWEB
- github.com/electron/electron/pull/32240ghsax_refsource_MISCWEB
- github.com/electron/electron/security/advisories/GHSA-3p22-ghq8-v749ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.