Generated remediation guidance and an executive summary. No account required.
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 39.8.1, 40.7.0, and 41.0.0, apps that use offscreen rendering and allow child windows via window.open() may be vulnerable to a use-after-free. If the parent offscreen WebContents is destroyed while a child window remains open, subsequent paint frames on the child dereference freed memory, which may lead to a crash or memory corruption. Apps are only affected if they use offscreen rendering (webPreferences.offscreen: true) and their setWindowOpenHandler permits child windows. Apps that do not use offscreen rendering, or that deny child windows, are not affected. This issue has been patched in versions 39.8.1, 40.7.0, and 41.0.0.
Use CWE-416, Electronjs vendor hub and Electron product page to widen CVE-2026-34774 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-34780, CVE-2026-34771 and CVE-2026-34775 for nearby disclosures in the same product family.