Details Published:
If you have automatic security updates enabled (the default), your application has already been updated automatically. End-users will receive the fix automatically when using your app. No action is required.
The small number of users who have explicitly disabled automatic security updates have been contacted directly by our team to ensure their apps are updated.
For reference, the manual update steps are:
A Reflected Cross-Site Scripting (XSS) vulnerability (CWE-79) was identified in the custom URL protocol handler of applications built with ToDesktop Builder before version 0.33.1. This vulnerability allows attackers to craft a malicious protocol link that executes arbitrary JavaScript in the context of the application’s offline page, with access to the ToDesktop API.
This issue was proactively identified through our Vulnerability Disclosure Program and resolved before any known exploitation occurred.
Applications built with affected versions of ToDesktop Builder were susceptible to reflected XSS attacks via the custom URL protocol handler. When the offline screen is enabled, user-supplied input in the protocol URL was not properly sanitized before being rendered, allowing an attacker to inject malicious scripts that execute when a user clicks a crafted link.
CVSS 4.0 Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N
All timestamps are in Coordinated Universal Time (UTC).
| Date and Time | Event |
|---|---|
| September 25th, 2025 1:42am | Vulnerability reported by Hunter Wodzenski. |
| September 26th, 2025 11:30pm | Fixed version of ToDesktop Builder released. |