CVE-2026-43941
Description
electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. In versions 3.8.15 and prior, Electerm's terminal hyperlink handler passes any URL clicked in the terminal directly to shell.openExternal without any protocol validation. An attacker who controls terminal output (e.g., via a malicious SSH server, compromised remote host, or malicious plugin rendering terminal content) can thus achieve arbitrary code execution or local file access on the victim's machine, requiring only that the victim clicks a displayed link. At time of publication, there are no publicly available patches.
EPSS (Exploit Prediction Scoring System)
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
Single Data Point
Only one EPSS measurement is available for this CVE. Trend analysis requires multiple data points over time.
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
DraftCommon Consequences
Applicable Platforms
URL Redirection to Untrusted Site ('Open Redirect')
DraftCommon Consequences
Applicable Platforms
Electerm by Electerm Project
cpe:2.3:a:electerm_project:electerm:*:*:*:*:*:*:*:*