### [CVE-2024-35222](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35222) ![](https://img.shields.io/static/v1?label=Product&message=tauri&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%3D%201.6.6%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-284%3A%20Improper%20Access%20Control&color=brighgreen) ### Description Tauri is a framework for building binaries for all major desktop platforms. Remote origin iFrames in Tauri applications can access the Tauri IPC endpoints without being explicitly allowed in the `dangerousRemoteDomainIpcAccess` in v1 and in the `capabilities` in v2. Valid commands with potentially unwanted consequences ("delete project", "transfer credits", etc.) could be invoked by an attacker that controls the content of an iframe running inside a Tauri app. This vulnerability has been patched in versions 1.6.7 and 2.0.0-beta.19. ### POC #### Reference - https://github.com/tauri-apps/tauri/security/advisories/GHSA-57fm-592m-34r7 #### Github No PoCs found on GitHub currently.