FreeDesktop Xdg Utils
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in FreeDesktop Xdg Utils.
By the Year
In 2026 there have been 0 vulnerabilities in FreeDesktop Xdg Utils. Last year, in 2025 Xdg Utils had 1 security vulnerability published. Right now, Xdg Utils is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 1 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 0 | 0.00 |
| 2022 | 1 | 7.40 |
| 2021 | 2 | 6.50 |
It may take a day or so for new Xdg Utils vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent FreeDesktop Xdg Utils Security Vulnerabilities
CVE-2025-52968: xdg-utils <=1.2.1 xdg-open CSRF via SameSite=Strict
CVE-2025-52968
- June 23, 2025
xdg-open in xdg-utils through 1.2.1 can send requests containing SameSite=Strict cookies, which can facilitate CSRF. (For example, xdg-open could be modified to, by default, associate x-scheme-handler/https with the execution of a browser with command-line options that arrange for an empty cookie store, although this would add substantial complexity, and would not be considered a desirable or expected behavior by all users.) NOTE: this is disputed because integrations of xdg-open typically do not provide information about whether the xdg-open command and arguments were manually entered by a user, or whether they were the result of a navigation from content in an untrusted origin.
Unprotected Alternate Channel
xdg-mail Improper URL Header Parsing Enables Unsafe Thunderbird Attachments
CVE-2022-4055
7.4 - High
- November 19, 2022
When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach files when clicked.
Improper Neutralization of Expression/Command Delimiters
The open_generic_xdg_mime function in xdg-open in xdg-utils 1.1.0 rc1 in Debian, when using dash, does not properly handle local variables, which
CVE-2015-1877
- June 02, 2021
The open_generic_xdg_mime function in xdg-open in xdg-utils 1.1.0 rc1 in Debian, when using dash, does not properly handle local variables, which allows remote attackers to execute arbitrary commands via a crafted file.
A flaw was found in the xdg-email component of xdg-utils-1.1.0-rc1 and newer
CVE-2020-27748
6.5 - Medium
- June 01, 2021
A flaw was found in the xdg-email component of xdg-utils-1.1.0-rc1 and newer. When handling mailto: URIs, xdg-email allows attachments to be discreetly added via the URI when being passed to Thunderbird. An attacker could potentially send a victim a URI that automatically attaches a sensitive file to a new email. If a victim user does not notice that an attachment was added and sends the email, this could result in sensitive information disclosure. It has been confirmed that the code behind this issue is in xdg-email and not in Thunderbird.
Insertion of Sensitive Information Into Sent Data
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for FreeDesktop Xdg Utils or by FreeDesktop? Click the Watch button to subscribe.