CVE-2025-54063: CWE-94: Improper Control of Generation of Code ('Code Injection') in CherryHQ cherry-studio
Cherry Studio is a desktop client that supports for multiple LLM providers. From versions 1.4.8 to 1.5.0, there is a one-click remote code execution vulnerability through the custom URL handling. An attacker can exploit this by hosting a malicious website or embedding a specially crafted URL on any website. If a victim clicks the exploit link in their browser, the app’s custom URL handler is triggered, leading to remote code execution on the victim’s machine. This issue has been patched in version 1.5.1.
AI Analysis
Technical Summary
CVE-2025-54063 is a critical remote code execution (RCE) vulnerability affecting Cherry Studio, a desktop client application developed by CherryHQ that supports multiple large language model (LLM) providers. The vulnerability exists in versions 1.4.8 through 1.5.0 and is caused by improper control over code generation, classified under CWE-94 (Improper Control of Generation of Code). Specifically, the flaw lies in the application's custom URL handling mechanism. When a user clicks a specially crafted URL—either hosted on a malicious website or embedded within any web page—the custom URL handler in Cherry Studio is triggered. This handler processes the URL without adequate validation or sanitization, allowing an attacker to inject and execute arbitrary code on the victim’s machine remotely. Exploitation requires user interaction (clicking the malicious link) but does not require any prior authentication or elevated privileges. The vulnerability has a CVSS 3.1 base score of 8.0, indicating high severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The issue was publicly disclosed on August 11, 2025, and patched in Cherry Studio version 1.5.1. No known exploits have been reported in the wild yet. This vulnerability poses a significant risk as it enables attackers to execute arbitrary code remotely, potentially leading to full system compromise, data theft, or disruption of services on affected endpoints running vulnerable versions of Cherry Studio.
Potential Impact
For European organizations, the impact of CVE-2025-54063 can be severe, especially for those using Cherry Studio as part of their AI or LLM integration workflows. Successful exploitation could lead to unauthorized access to sensitive data, intellectual property theft, or deployment of malware/ransomware within corporate networks. Given the high confidentiality, integrity, and availability impacts, attackers could manipulate or exfiltrate critical data, disrupt business operations, or pivot to other internal systems. Organizations in sectors such as finance, healthcare, research, and government—where LLM tools may be integrated for productivity or innovation—are particularly at risk. The requirement for user interaction means phishing or social engineering campaigns could be leveraged to trick employees into clicking malicious links, amplifying the threat. Additionally, since the vulnerability affects desktop clients, endpoint security controls and user awareness are crucial. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score underscores the urgency for patching and risk management.
Mitigation Recommendations
1. Immediate upgrade: Organizations should promptly update Cherry Studio to version 1.5.1 or later, where the vulnerability is patched. 2. URL handling restrictions: Implement endpoint security policies that restrict or monitor the invocation of custom URL handlers, especially those linked to Cherry Studio, to prevent automatic or unintended execution. 3. User awareness training: Educate users about the risks of clicking unknown or suspicious links, particularly those that could trigger application-specific handlers. 4. Network segmentation: Limit the exposure of endpoints running Cherry Studio by segmenting networks and applying strict access controls to reduce the attack surface. 5. Endpoint detection and response (EDR): Deploy and tune EDR solutions to detect anomalous behaviors indicative of code injection or remote code execution attempts. 6. Application whitelisting: Use application control mechanisms to prevent unauthorized code execution or the launching of unexpected processes triggered by URL handlers. 7. Monitor for Indicators of Compromise (IoCs): Although no exploits are known in the wild, monitor logs and network traffic for suspicious URL handler invocations or unusual process executions related to Cherry Studio. 8. Incident response readiness: Prepare and test incident response plans to quickly contain and remediate any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Ireland, Switzerland
CVE-2025-54063: CWE-94: Improper Control of Generation of Code ('Code Injection') in CherryHQ cherry-studio
Description
Cherry Studio is a desktop client that supports for multiple LLM providers. From versions 1.4.8 to 1.5.0, there is a one-click remote code execution vulnerability through the custom URL handling. An attacker can exploit this by hosting a malicious website or embedding a specially crafted URL on any website. If a victim clicks the exploit link in their browser, the app’s custom URL handler is triggered, leading to remote code execution on the victim’s machine. This issue has been patched in version 1.5.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-54063 is a critical remote code execution (RCE) vulnerability affecting Cherry Studio, a desktop client application developed by CherryHQ that supports multiple large language model (LLM) providers. The vulnerability exists in versions 1.4.8 through 1.5.0 and is caused by improper control over code generation, classified under CWE-94 (Improper Control of Generation of Code). Specifically, the flaw lies in the application's custom URL handling mechanism. When a user clicks a specially crafted URL—either hosted on a malicious website or embedded within any web page—the custom URL handler in Cherry Studio is triggered. This handler processes the URL without adequate validation or sanitization, allowing an attacker to inject and execute arbitrary code on the victim’s machine remotely. Exploitation requires user interaction (clicking the malicious link) but does not require any prior authentication or elevated privileges. The vulnerability has a CVSS 3.1 base score of 8.0, indicating high severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The issue was publicly disclosed on August 11, 2025, and patched in Cherry Studio version 1.5.1. No known exploits have been reported in the wild yet. This vulnerability poses a significant risk as it enables attackers to execute arbitrary code remotely, potentially leading to full system compromise, data theft, or disruption of services on affected endpoints running vulnerable versions of Cherry Studio.
Potential Impact
For European organizations, the impact of CVE-2025-54063 can be severe, especially for those using Cherry Studio as part of their AI or LLM integration workflows. Successful exploitation could lead to unauthorized access to sensitive data, intellectual property theft, or deployment of malware/ransomware within corporate networks. Given the high confidentiality, integrity, and availability impacts, attackers could manipulate or exfiltrate critical data, disrupt business operations, or pivot to other internal systems. Organizations in sectors such as finance, healthcare, research, and government—where LLM tools may be integrated for productivity or innovation—are particularly at risk. The requirement for user interaction means phishing or social engineering campaigns could be leveraged to trick employees into clicking malicious links, amplifying the threat. Additionally, since the vulnerability affects desktop clients, endpoint security controls and user awareness are crucial. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score underscores the urgency for patching and risk management.
Mitigation Recommendations
1. Immediate upgrade: Organizations should promptly update Cherry Studio to version 1.5.1 or later, where the vulnerability is patched. 2. URL handling restrictions: Implement endpoint security policies that restrict or monitor the invocation of custom URL handlers, especially those linked to Cherry Studio, to prevent automatic or unintended execution. 3. User awareness training: Educate users about the risks of clicking unknown or suspicious links, particularly those that could trigger application-specific handlers. 4. Network segmentation: Limit the exposure of endpoints running Cherry Studio by segmenting networks and applying strict access controls to reduce the attack surface. 5. Endpoint detection and response (EDR): Deploy and tune EDR solutions to detect anomalous behaviors indicative of code injection or remote code execution attempts. 6. Application whitelisting: Use application control mechanisms to prevent unauthorized code execution or the launching of unexpected processes triggered by URL handlers. 7. Monitor for Indicators of Compromise (IoCs): Although no exploits are known in the wild, monitor logs and network traffic for suspicious URL handler invocations or unusual process executions related to Cherry Studio. 8. Incident response readiness: Prepare and test incident response plans to quickly contain and remediate any exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-07-16T13:22:18.204Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689a3048ad5a09ad0027c678
Added to database: 8/11/2025, 6:02:48 PM
Last enriched: 8/11/2025, 6:19:02 PM
Last updated: 11/11/2025, 9:05:13 PM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64531: Use After Free (CWE-416) in Adobe Substance3D - Stager
HighCVE-2025-61835: Integer Underflow (Wrap or Wraparound) (CWE-191) in Adobe Substance3D - Stager
HighCVE-2025-61834: Use After Free (CWE-416) in Adobe Substance3D - Stager
HighCVE-2025-61833: Out-of-bounds Read (CWE-125) in Adobe Substance3D - Stager
HighCVE-2024-53649: CWE-552: Files or Directories Accessible to External Parties in Siemens SIPROTEC 5 6MD84 (CP300)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.