CVE-2025-31477
JavaScript vulnerability analysis and mitigation

Overview

The Tauri shell plugin prior to version 2.2.1 contains a vulnerability in its open endpoint functionality. The plugin is designed to allow opening programs using the system opener (e.g. xdg-open on Linux) and was intended to restrict protocols to https and mailto by default. However, due to improper validation of allowed protocols, the default restriction was not functional, allowing potentially dangerous protocols like file://, smb://, or nfs:// to be opened by the system registered protocol handler (GitHub Advisory).

Technical details

The vulnerability stems from improper validation of the allowed protocols in the open endpoint. The plugin failed to properly validate input when the open configuration was not explicitly set, effectively bypassing the intended protocol restrictions. This affected both JavaScript calls through the plugin API and direct Rust code execution. The vulnerability has been assigned a CVSS score of 9.3 CRITICAL with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N and is tracked as CWE-20 (Improper Input Validation) (NVD).

Impact

By exploiting this vulnerability, attackers can achieve remote code execution on the target system by passing untrusted user input to the open endpoint. This can be accomplished either through direct exposure of the endpoint to application users or through code execution in the frontend of a Tauri application (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 2.2.1 of the plugin. For users unable to upgrade, several workarounds are available: 1) Set the shell plugin configuration value 'open' to true to only allow mailto, http, and https protocols, 2) Define a non-matching regex like 'tauri^' in the plugin configuration, or 3) Remove shell:default and all instances of shell:allow-open from the capabilities. Additionally, users are recommended to switch to the opener plugin, as the shell plugin's open endpoint was previously deprecated (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55182CRITICAL10
  • JavaScriptJavaScript
  • react-server-dom-webpack
NoYesDec 03, 2025
CVE-2025-66032HIGH8.7
  • JavaScriptJavaScript
  • @anthropic-ai/claude-code
NoYesDec 03, 2025
CVE-2025-66412HIGH8.5
  • JavaScriptJavaScript
  • @angular/compiler
NoYesDec 01, 2025
CVE-2025-66415MEDIUM6.9
  • JavaScriptJavaScript
  • @fastify/reply-from
NoYesDec 01, 2025
CVE-2025-66404MEDIUM6.4
  • JavaScriptJavaScript
  • mcp-server-kubernetes
NoYesDec 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management