Figma Desktop for Windows version 125.6.5 contains a command injection vulnerability in the local plugin loader. An attacker can execute arbitrary OS commands by setting a crafted build field in the plugin's manifest.json. This field is passed to child_process.exec without validation, leading to possible RCE. NOTE: this is disputed by the Supplier because the behavior only allows a local user to attack himself via a local plugin. The local build procedure, which is essential to the attack, is not executed for plugins shared to the Figma Community.
References
| Link | Resource |
|---|---|
| https://github.com/shinyColumn/CVE-2025-56803 | Exploit Third Party Advisory |
| https://shinycolumn.notion.site/figma-command-injection | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-09-03 18:15
Updated : 2025-09-26 14:02
NVD link : CVE-2025-56803
Mitre link : CVE-2025-56803
CVE.ORG link : CVE-2025-56803
JSON object : View
Products Affected
figma
- desktop
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
