CVE-2026-30793
Received Received - Intake
CSRF in RustDesk Client URI Handler Enables Privilege Escalation

Publication date: 2026-03-05

Last updated on: 2026-03-25

Assigner: VULSec Labs

Description
Cross-Site Request Forgery (CSRF) vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Flutter URI scheme handler, FFI bridge modules) allows Privilege Escalation. This vulnerability is associated with program files flutter/lib/common.Dart, src/flutter_ffi.Rs and program routines URI handler for rustdesk://password/, bind.MainSetPermanentPassword(). This issue affects RustDesk Client: through 1.4.5.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-05
Last Modified
2026-03-25
Generated
2026-05-07
AI Q&A
2026-03-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
rustdesk rustdesk to 1.4.5 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Can you explain this vulnerability to me?

This vulnerability is a Cross-Site Request Forgery (CSRF) issue found in the RustDesk Client (rustdesk-client) on multiple platforms including Windows, MacOS, Linux, iOS, and Android. It involves the Flutter URI scheme handler and FFI bridge modules, specifically in program files such as flutter/lib/common.Dart, src/flutter_ffi.Rs, and the URI handler for rustdesk://password/. The vulnerability allows an attacker to perform privilege escalation by exploiting the bind.MainSetPermanentPassword() routine.


How can this vulnerability impact me? :

This vulnerability can lead to privilege escalation, meaning an attacker could gain higher-level access or control over the RustDesk Client than intended. This could allow unauthorized actions or changes within the application, potentially compromising the security and integrity of the system where the client is installed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart