<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Electerm (&lt;= 3.8.8) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/electerm--3.8.8/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 20:17:11 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/electerm--3.8.8/feed.xml" rel="self" type="application/rss+xml"/><item><title>Electerm Vulnerable to Remote Code Execution via Malicious Bookmarks (CVE-2026-45058)</title><link>https://feed.craftedsignal.io/briefs/2026-05-electerm-rce/</link><pubDate>Thu, 14 May 2026 20:17:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-electerm-rce/</guid><description>Electerm is vulnerable to remote code execution (CVE-2026-45058) via maliciously crafted bookmark files or compromised sync targets, allowing attackers to inject arbitrary commands when a bookmark is opened or when a sync operation is performed.</description><content:encoded><![CDATA[<p>Electerm, a popular terminal application, is susceptible to a critical remote code execution vulnerability (CVE-2026-45058). This flaw affects users who import bookmark JSON files or utilize Electerm&rsquo;s synchronization feature via Gist or WebDAV. An attacker can exploit this vulnerability by injecting malicious <code>exec*</code> fields or manipulating the global configuration within a crafted bookmark file or a compromised sync target. The injected code is executed when a user opens a compromised bookmark or when Electerm applies the settings from a tampered sync target. This vulnerability impacts Electerm versions 3.8.8 and earlier, potentially allowing attackers to gain persistent code execution on the victim&rsquo;s system. Defenders should prioritize detecting and preventing the import of untrusted bookmark data to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious bookmark JSON file containing injected <code>exec*</code> fields or altered global configuration settings.</li>
<li>The attacker distributes the malicious bookmark file to a target user, potentially through social engineering or by compromising a WebDAV sync target.</li>
<li>The user imports the malicious bookmark JSON file into Electerm through the application&rsquo;s import functionality.</li>
<li>Electerm parses the JSON file, loading the attacker-controlled <code>exec*</code> fields or global configuration into its settings.</li>
<li>The user opens a bookmark that contains the malicious <code>exec*</code> payload. Alternatively, electerm syncs with a compromised WebDAV server.</li>
<li>Electerm executes the injected code or applies the malicious configuration using a local-pty context.</li>
<li>The attacker gains code execution on the user&rsquo;s system with the privileges of the Electerm process.</li>
<li>The attacker can then perform further actions such as installing malware, exfiltrating data, or establishing persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-45058 leads to arbitrary code execution on the victim&rsquo;s machine. This can result in complete system compromise, data theft, or the deployment of ransomware. The impact is particularly severe for users who rely on Electerm&rsquo;s synchronization feature, as a compromised sync target can propagate the malicious configuration across multiple systems. While the exact number of potential victims is unknown, the vulnerability affects all Electerm users running versions 3.8.8 and earlier.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious Electerm Bookmark Import</code> to detect attempts to import malicious bookmark files (log source: <code>process_creation</code>).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Electerm Sync</code> to detect connections to unusual WebDAV servers or Gists (log source: <code>network_connection</code>).</li>
<li>Monitor Electerm&rsquo;s configuration files for unexpected changes, specifically modifications to the <code>exec*</code> fields (log source: <code>file_event</code>).</li>
<li>Educate users on the risks of importing untrusted bookmark data and advise against importing bookmarks from unknown or untrusted sources.</li>
<li>Consider temporarily disabling Electerm&rsquo;s synchronization feature until a patch is available to prevent compromised sync targets from being exploited.</li>
<li>Investigate any alerts generated by the Sigma rules and take appropriate remediation steps to contain any potential compromises.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>electerm</category><category>code-execution</category><category>cve-2026-45058</category></item></channel></rss>