Electron: HTTP Response Header Injection in custom protocol handlers and webRequest
Package
Affected versions
< 38.8.6
>= 39.0.0-alpha.1, < 39.8.3
>= 40.0.0-alpha.1, < 40.8.3
>= 41.0.0-alpha.1, < 41.0.3
Patched versions
38.8.6
39.8.3
40.8.3
41.0.3
Description
Published to the GitHub Advisory Database
Apr 3, 2026
Reviewed
Apr 3, 2026
Last updated
Apr 3, 2026
Impact
Apps that register custom protocol handlers via
protocol.handle()/protocol.registerSchemesAsPrivileged()or modify response headers viawebRequest.onHeadersReceivedmay be vulnerable to HTTP response header injection if attacker-controlled input is reflected into a response header name or value.An attacker who can influence a header value may be able to inject additional response headers, affecting cookies, content security policy, or cross-origin access controls.
Apps that do not reflect external input into response headers are not affected.
Workarounds
Validate or sanitize any untrusted input before including it in a response header name or value.
Fixed Versions
41.0.340.8.339.8.338.8.6For more information
If there are any questions or comments about this advisory, send an email to security@electronjs.org
References