Details Published:
If you have automatic security updates enabled (the default), your application has already been updated automatically. End-users will receive the fix automatically when using your app. No action is required.
The small number of users who have explicitly disabled automatic security updates have been contacted directly by our team to ensure their apps are updated.
For reference, the manual update steps are:
A path traversal vulnerability (CWE-22) was identified in the todesktop-fs:// protocol handler used by applications built with ToDesktop Builder before version 0.36.1. Insufficient validation of user-controlled protocol input could allow an attacker to read arbitrary files from the host system.
This issue was responsibly disclosed through our Vulnerability Disclosure Program and resolved before any known exploitation occurred.
todesktop-fs:// protocol to traverse outside the intended bundled files directory and read arbitrary local files accessible to the application.Applications built with affected versions exposed bundled files through the todesktop-fs:// custom protocol. In vulnerable versions, requests to the protocol handler were not sufficiently validated before being resolved on disk. This made it possible to traverse outside the intended files directory and retrieve other local files from the host system.
Version 0.36.1 added validation to ensure todesktop-fs:// requests remain scoped to the bundled files directory.
All timestamps are in Coordinated Universal Time (UTC).
| Date | Event |
|---|---|
| January 5th, 2026 | Vulnerability reported by Kirolos Gerges. |
| January 6th, 2026 | Fix released in ToDesktop Builder 0.36.1. |
| April 5th, 2026 | Public disclosure. |