Description
Tauri is a framework for building binaries for all major desktop platforms. The filesystem glob pattern wildcards `*`, `?`, and `[...]` match file path literals and leading dots by default, which unintentionally exposes sub folder content of allowed paths. Scopes without the wildcards are not affected. As `**` allows for sub directories the behavior there is also as expected. The issue has been patched in the latest release and was backported into the currently supported 1.x branches. There are no known workarounds at the time of publication.
References (3)
Core 3
Core References
Exploit, Third Party Advisory x_refsource_confirm
https://github.com/tauri-apps/tauri/security/advisories/GHSA-6mv3-wm7j-h4w5
Patch, Third Party Advisory x_refsource_misc
https://github.com/tauri-apps/tauri/commit/72389b00d7b495ffd7750eb1e75a3b8537d07cf3
Patch, Third Party Advisory x_refsource_misc
https://github.com/tauri-apps/tauri/commit/f0602e7c294245ab6ef6fbf2a976ef398340ef58
Scores
CVSS v3
6.8
EPSS
0.0051
EPSS Percentile
66.5%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-22
Status
published
Products (3)
crates.io/tauri
1.0.0 - 1.0.8crates.io
tauri/tauri
2.0.0 alpha0 (2 CPE variants)
tauri/tauri
1.0.0 - 1.0.8
Published
Dec 23, 2022
Tracked Since
Feb 18, 2026