CVE-2025-31477: Improper Scope Validation in the `open` Endpoint of `tauri-plugin-shell`
(updated )
The Tauri shell
plugin exposes functionality to execute code and open programs on the system. The open
endpoint of this plugin is designed to allow open functionality with the system opener (e.g.
xdg-open
on Linux). This was meant to be restricted to a reasonable number of protocols like https
or mailto
by default.
This default restriction was not functional due to improper validation of the allowed protocols, allowing for potentially dangerous protocols like file://
, smb://
, or nfs://
and others to be opened by the system registered protocol handler.
By passing untrusted user input to the open
endpoint these potentially dangerous protocols can be abused to gain remote code execution on the system. This either requires direct exposure of the endpoint to application users or code execution in the frontend of a Tauri application.
You are not affected if you have explicitly configured a validation regex or manually set the open
endpoint to true
in the plugin configuration.
Technically the scope was never a limitation for the rust side as it is not seen as an enforceable security boundary but we decided to mark the rust crate as affected since the plugin does not need to be a frontend dependency to be exposed.
References
Code Behaviors & Features
Detect and mitigate CVE-2025-31477 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →