Electron Capture facilitates video playback for screen-sharing and capture. In versions 2.19.1 and below, the elecap app on macOS allows local unprivileged users to bypass macOS TCC privacy protections by enabling ELECTRON_RUN_AS_NODE. This environment variable allows arbitrary Node.js code to be executed via the -e flag, which runs inside the main Electron context, inheriting any previously granted TCC entitlements (such as access to Documents, Downloads, etc.). This issue is fixed in version 2.20.0.
References
| Link | Resource |
|---|---|
| https://github.com/steveseguin/electroncapture/commit/3837f54e75911bb99fa45cfa138a5e401d16f531 | Patch |
| https://github.com/steveseguin/electroncapture/releases/tag/2.20.0 | Release Notes |
| https://github.com/steveseguin/electroncapture/security/advisories/GHSA-8849-p3j4-jq4h | Exploit Vendor Advisory |
| https://github.com/steveseguin/electroncapture/security/advisories/GHSA-8849-p3j4-jq4h | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-08-05 01:15
Updated : 2025-10-09 17:33
NVD link : CVE-2025-54871
Mitre link : CVE-2025-54871
CVE.ORG link : CVE-2025-54871
JSON object : View
Products Affected
electroncapture
- electron_capture
CWE
