During Metafes 2025 and now again during BOOTH Festival, which are both promoted directly by VRChat and are high-traffic worlds, a remote user (likely using a custom client) is able to launch URL's in browser windows or tabs until a user's machine runs out of memory, leading to a DoS on the target. The launched URL's are only the URL's that the world offers to open as part of the normal experience when interacted with approiately. However, affected users will see performance and stability issues within their OS, as well as a possible loss of work if they have open projects which are closed due to low memory availability.
I reported the issue privately (helpdesk #630818) on November 2nd and it was finally acknowledged on November 28th. Only acknowledged with no further response. It was being actively exploited at the time of the report.
There are no mitigations to this from the VRChat client other than not joining public worlds (which further reduces VRChat's public player base), but they have been informed of the issue and acknowledged receipt of it. I propose that VRChat do one or more of the following:
  • Spawn a pop-up before a URL is launched, asking consent to open it and informing the user that it is actually happening, as otherwise the browser opens in the background without their knowledge.
  • Add setting to turn off URL launching entirely, as the pop-ups can be easily overwhelming.
  • Revoke the ability to launch URL's from the client until the cause of opening them remotely has been identified and fixed.
For users: These worlds have the "admin_filter_UrlLauncher" tag, allowing them to open browser windows. If you are aware of a world that has these tags, do not join public instances until the issue has been resolved.