Electerm Local Code Execution via Single-Instance Socket (CVE-2026-45353)
Electerm versions 3.0.6 through 3.8.8 are vulnerable to local code execution (CVE-2026-45353) where a same-user process can send a JSON payload to the application's single-instance socket/pipe, leading to arbitrary tab creation and local process spawning.
Electerm versions 3.0.6 through 3.8.8 are susceptible to a local code execution vulnerability (CVE-2026-45353) due to improper handling of inter-process communication. The single-instance feature of Electerm uses a socket or named pipe to communicate between instances of the application. An attacker with local access to the same user account can send a malicious JSON payload to this socket, bypassing intended security controls. This payload can instruct Electerm to create new tabs or execute arbitrary local processes, effectively granting the attacker code execution within the context of the Electerm application. This vulnerability impacts single-instance installations of Electerm and could lead to privilege escalation or data compromise if exploited.
Attack Chain
- The attacker identifies the Electerm single-instance socket/pipe.
- The attacker crafts a malicious JSON payload designed to trigger code execution. This payload leverages Electerm’s inter-process communication mechanism.
- The attacker uses a separate process running under the same user account to send the malicious JSON payload to the Electerm socket/pipe.
- Electerm receives the payload and, due to insufficient validation, processes the malicious instructions.
- The malicious payload instructs Electerm to create a new tab.
- The creation of the new tab triggers the execution of attacker-controlled code within the Electerm process.
- The attacker-controlled code spawns a local process. This process could be a reverse shell, a data exfiltration tool, or any other arbitrary executable.
- The attacker gains control of the spawned process, achieving local code execution.
Impact
Successful exploitation of CVE-2026-45353 allows a local attacker to execute arbitrary code within the context of the Electerm application. This can lead to a variety of malicious outcomes, including privilege escalation, data theft, and system compromise. The impact is limited to single-instance installations of Electerm. If successfully exploited, an attacker can potentially gain full control over the user’s session and sensitive data accessible by Electerm.
Recommendation
- Upgrade Electerm to a version greater than 3.8.8 to patch CVE-2026-45353, as indicated by the patch commit https://github.com/electerm/electerm/commit/0599e67069b00e376a2e962649aaad6096e63507.
- Deploy the Sigma rule “Detect Electerm Malicious Payload Delivery” to detect suspicious processes attempting to interact with Electerm’s single-instance socket.
- Monitor process creation events for unexpected child processes spawned by Electerm, leveraging the “Detect Electerm Suspicious Child Processes” Sigma rule.
Detection coverage 2
Detect Electerm Malicious Payload Delivery
highDetects CVE-2026-45353 exploitation — Suspicious processes attempting to interact with Electerm's single-instance socket/pipe using interprocess communication.
Detect Electerm Suspicious Child Processes
highDetects CVE-2026-45353 exploitation — Electerm spawning suspicious child processes, potentially indicating code execution.
Detection queries are available on the platform. Get full rules →