Critical severity9.6GHSA Advisory· Published May 8, 2026· Updated May 8, 2026
CVE-2026-43941
CVE-2026-43941
Description
electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. In versions 3.8.15 and prior, Electerm's terminal hyperlink handler passes any URL clicked in the terminal directly to shell.openExternal without any protocol validation. An attacker who controls terminal output (e.g., via a malicious SSH server, compromised remote host, or malicious plugin rendering terminal content) can thus achieve arbitrary code execution or local file access on the victim's machine, requiring only that the victim clicks a displayed link. At time of publication, there are no publicly available patches.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-fwf6-j56g-m97cghsaADVISORY
- github.com/electerm/electerm/security/advisories/GHSA-fwf6-j56g-m97cnvdVendor AdvisoryMitigation
- nvd.nist.gov/vuln/detail/CVE-2026-43941ghsa
News mentions
0No linked articles in our index yet.