Generated remediation guidance and an executive summary. No account required.
Electron before versions 11.0.0-beta.6, 10.1.2, 9.3.1 or 8.5.2 is vulnerable to a context isolation bypass. Apps using both `contextIsolation` and `sandbox: true` are affected. Apps using both `contextIsolation` and `nodeIntegrationInSubFrames: true` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
Cite this page
CVE-2020-15215. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2020-15215
Use CWE-668, Electronjs vendor hub and Electron product page to widen CVE-2020-15215 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-34780, CVE-2026-34774 and CVE-2026-34771 for nearby disclosures in the same product family.