CVE-2026-43944

electerm · electerm

The electerm client is vulnerable to local code execution via maliciously crafted deep links or command-line options.

Executive summary

A critical local code execution vulnerability in electerm allows attackers to execute arbitrary commands by tricking users into opening malicious links.

Vulnerability

The application fails to sanitize inputs provided via deep links or CLI arguments, allowing an attacker to inject and execute arbitrary OS commands when the application is launched.

Business impact

With a CVSS score of 9.6, this vulnerability allows for local system compromise. An attacker gaining code execution on a user's machine can steal local credentials, access SSH keys, or pivot into internal network segments, causing significant security breaches.

Remediation

Immediate Action: Update electerm to version 3.8.15 or later immediately.

Proactive Monitoring: Monitor endpoint logs for suspicious process execution spawned by the electerm application.

Compensating Controls: Implement endpoint protection (EDR) to detect and block abnormal command-line execution patterns originating from terminal/SSH clients.

Exploitation status

Public Exploit Available: No

Analyst recommendation

This vulnerability requires urgent attention, especially for users who frequently interact with external links or handle remote systems. Patching is the only effective way to mitigate the risk of command injection.