Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-42184
Published:May 06, 2026
Updated:May 11, 2026
Summary A flaw in Tauri's "is_local_url()" function causes it to incorrectly classify remote URLs as trusted local origins on Windows and Android. On these systems, Tauri maps custom URI scheme protocols to "http://<scheme>.localhost/" because those platforms' WebView implementations cannot serve custom URI schemes directly. The issue is that Tauri's check to see if the origin is local, only checks the first subdomain of the URL. An attacker can abuse this by hosting a page on a domain whose subdomain matches the custom scheme of the application (e.g. http://app.attacker.com/)." Example: - Local URL: "app://localhost/" → on Android/Windows: "http://app.localhost/" - The check passes for any URL starting with "http://app.", including "http://app.evil.com/" As a result, the attacker page can invoke backend commands that the developer intended to be accessible only to the app's own frontend and that are explicitly restricted from being called by external or remote origins. Details Vulnerable function: #[cfg(any(windows, target_os = "android"))] let local = { let protocol_url = self.manager().tauri_protocol_url(uses_https); let maybe_protocol = current_url .domain() .and_then(|d| d.split_once('.')) // BUG: only splits on first dot .unwrap_or_default() .0; protocols.contains_key(maybe_protocol) && scheme == protocol_url.scheme() }; Link: https://github.com/tauri-apps/tauri/blob/1ef6a119b1571d1da0acc08bdb7fd5521a4c6d52/crates/tauri/src/webview/mod.rs#L1680 "split_once('.')" discards everything after the first ".". For http://app.evil.com/, the extracted label is app. If the application has registered a protocol named app, "protocols.contains_key("app")" returns "true" and the URL is classified as "Origin::Local". The correct check must assert the full domain is exactly "<protocol>.localhost". PoC We created a proof of concept app that can be found "here" (https://drive.google.com/file/d/1YME6YMSKv69JxFF7Ne0OrZ6tGC_OH7Jw/view?usp=sharing). The app registers a custom app:// protocol and exposes a ping command restricted to local origins only. It provides a button to open a URL in a WebView, pre-filled with https://app.robbe-bc9.workers.dev/, an attacker-controlled page that invokes ping on load. Because the domain's first label matches the registered app protocol, is_local_url() classifies it as a local origin and the command succeeds. "capabilities/main.json" contains the following code, which only exposes "ping" locally: { "$schema": "../../../crates/tauri-schema-generator/schemas/capability.schema.json", "identifier": "main", "local": true, "windows": ["*"], "permissions": [ "sample:allow-ping" ] } "src/lib.rs" contains the following code, to register a custom scheme: tauri::Builder::default() .register_uri_scheme_protocol("app", |_ctx, _request| { ... }) Impact The attacker page can invoke backend commands that the developer intended to be accessible only to the app's own frontend and that are explicitly restricted from being called by external or remote origins.
Affected Packages
https://github.com/tauri-apps/tauri.git (GITHUB):
Affected version(s) >=tauri-v2.0.0 <tauri-v2.11.1
Fix Suggestion:
Update to version tauri-v2.11.1
tauri (RUST):
Affected version(s) >=2.0.0 <2.11.1
Fix Suggestion:
Update to version 2.11.1
Do you need more information?
Contact Us
CVSS v4
Base Score:
6.1
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
PRESENT
Privileges Required
NONE
User Interaction
PASSIVE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
HIGH
Vulnerable System Availability
LOW
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
6.4
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
LOW
Integrity
HIGH
Availability
LOW
Weakness Type (CWE)
Server-Side Request Forgery (SSRF)