Versions of the package window-control before 1.4.5 are vulnerable to Command Injection via the sendKeys function, due to improper input sanitization.
References
Link | Resource |
---|---|
https://github.com/bruno-robert/window-control/commit/075c854534a749d887655a906759f5a7eee95173 | Patch Third Party Advisory |
https://github.com/bruno-robert/window-control/releases/tag/v1.4.5 | Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-WINDOWCONTROL-3186345 | Third Party Advisory |
https://github.com/bruno-robert/window-control/commit/075c854534a749d887655a906759f5a7eee95173 | Patch Third Party Advisory |
https://github.com/bruno-robert/window-control/releases/tag/v1.4.5 | Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-WINDOWCONTROL-3186345 | Third Party Advisory |
Configurations
History
10 Apr 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-94 |
Information
Published : 2023-01-04 18:15
Updated : 2025-04-10 14:15
NVD link : CVE-2022-25926
Mitre link : CVE-2022-25926
CVE.ORG link : CVE-2022-25926
JSON object : View
Products Affected
window-control_project
- window-control
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
NVD-CWE-Other CWE-94Improper Control of Generation of Code ('Code Injection')