CVE-2025-54063: CWE-94: Improper Control of Generation of Code ('Code Injection') in CherryHQ cherry-studio
Cherry Studio is a desktop client that supports for multiple LLM providers. From versions 1.4.8 to 1.5.0, there is a one-click remote code execution vulnerability through the custom URL handling. An attacker can exploit this by hosting a malicious website or embedding a specially crafted URL on any website. If a victim clicks the exploit link in their browser, the app’s custom URL handler is triggered, leading to remote code execution on the victim’s machine. This issue has been patched in version 1.5.1.
AI Analysis
Technical Summary
CVE-2025-54063 is a critical remote code execution (RCE) vulnerability affecting Cherry Studio, a desktop client application developed by CherryHQ that supports multiple large language model (LLM) providers. The vulnerability exists in versions 1.4.8 through 1.5.0 and is caused by improper control over code generation, classified under CWE-94 (Improper Control of Generation of Code). Specifically, the flaw lies in the application's custom URL handling mechanism. When a user clicks a specially crafted URL—either hosted on a malicious website or embedded within any web page—the custom URL handler in Cherry Studio is triggered. This handler processes the URL without adequate validation or sanitization, allowing an attacker to inject and execute arbitrary code on the victim’s machine remotely. Exploitation requires user interaction (clicking the malicious link) but does not require any prior authentication or elevated privileges. The vulnerability has a CVSS 3.1 base score of 8.0, indicating high severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The issue was publicly disclosed on August 11, 2025, and patched in Cherry Studio version 1.5.1. No known exploits have been reported in the wild yet. This vulnerability poses a significant risk as it enables attackers to execute arbitrary code remotely, potentially leading to full system compromise, data theft, or disruption of services on affected endpoints running vulnerable versions of Cherry Studio.
Potential Impact
For European organizations, the impact of CVE-2025-54063 can be severe, especially for those using Cherry Studio as part of their AI or LLM integration workflows. Successful exploitation could lead to unauthorized access to sensitive data, intellectual property theft, or deployment of malware/ransomware within corporate networks. Given the high confidentiality, integrity, and availability impacts, attackers could manipulate or exfiltrate critical data, disrupt business operations, or pivot to other internal systems. Organizations in sectors such as finance, healthcare, research, and government—where LLM tools may be integrated for productivity or innovation—are particularly at risk. The requirement for user interaction means phishing or social engineering campaigns could be leveraged to trick employees into clicking malicious links, amplifying the threat. Additionally, since the vulnerability affects desktop clients, endpoint security controls and user awareness are crucial. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score underscores the urgency for patching and risk management.
Mitigation Recommendations
1. Immediate upgrade: Organizations should promptly update Cherry Studio to version 1.5.1 or later, where the vulnerability is patched. 2. URL handling restrictions: Implement endpoint security policies that restrict or monitor the invocation of custom URL handlers, especially those linked to Cherry Studio, to prevent automatic or unintended execution. 3. User awareness training: Educate users about the risks of clicking unknown or suspicious links, particularly those that could trigger application-specific handlers. 4. Network segmentation: Limit the exposure of endpoints running Cherry Studio by segmenting networks and applying strict access controls to reduce the attack surface. 5. Endpoint detection and response (EDR): Deploy and tune EDR solutions to detect anomalous behaviors indicative of code injection or remote code execution attempts. 6. Application whitelisting: Use application control mechanisms to prevent unauthorized code execution or the launching of unexpected processes triggered by URL handlers. 7. Monitor for Indicators of Compromise (IoCs): Although no exploits are known in the wild, monitor logs and network traffic for suspicious URL handler invocations or unusual process executions related to Cherry Studio. 8. Incident response readiness: Prepare and test incident response plans to quickly contain and remediate any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Ireland, Switzerland
CVE-2025-54063: CWE-94: Improper Control of Generation of Code ('Code Injection') in CherryHQ cherry-studio
Description
Cherry Studio is a desktop client that supports for multiple LLM providers. From versions 1.4.8 to 1.5.0, there is a one-click remote code execution vulnerability through the custom URL handling. An attacker can exploit this by hosting a malicious website or embedding a specially crafted URL on any website. If a victim clicks the exploit link in their browser, the app’s custom URL handler is triggered, leading to remote code execution on the victim’s machine. This issue has been patched in version 1.5.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-54063 is a critical remote code execution (RCE) vulnerability affecting Cherry Studio, a desktop client application developed by CherryHQ that supports multiple large language model (LLM) providers. The vulnerability exists in versions 1.4.8 through 1.5.0 and is caused by improper control over code generation, classified under CWE-94 (Improper Control of Generation of Code). Specifically, the flaw lies in the application's custom URL handling mechanism. When a user clicks a specially crafted URL—either hosted on a malicious website or embedded within any web page—the custom URL handler in Cherry Studio is triggered. This handler processes the URL without adequate validation or sanitization, allowing an attacker to inject and execute arbitrary code on the victim’s machine remotely. Exploitation requires user interaction (clicking the malicious link) but does not require any prior authentication or elevated privileges. The vulnerability has a CVSS 3.1 base score of 8.0, indicating high severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The issue was publicly disclosed on August 11, 2025, and patched in Cherry Studio version 1.5.1. No known exploits have been reported in the wild yet. This vulnerability poses a significant risk as it enables attackers to execute arbitrary code remotely, potentially leading to full system compromise, data theft, or disruption of services on affected endpoints running vulnerable versions of Cherry Studio.
Potential Impact
For European organizations, the impact of CVE-2025-54063 can be severe, especially for those using Cherry Studio as part of their AI or LLM integration workflows. Successful exploitation could lead to unauthorized access to sensitive data, intellectual property theft, or deployment of malware/ransomware within corporate networks. Given the high confidentiality, integrity, and availability impacts, attackers could manipulate or exfiltrate critical data, disrupt business operations, or pivot to other internal systems. Organizations in sectors such as finance, healthcare, research, and government—where LLM tools may be integrated for productivity or innovation—are particularly at risk. The requirement for user interaction means phishing or social engineering campaigns could be leveraged to trick employees into clicking malicious links, amplifying the threat. Additionally, since the vulnerability affects desktop clients, endpoint security controls and user awareness are crucial. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score underscores the urgency for patching and risk management.
Mitigation Recommendations
1. Immediate upgrade: Organizations should promptly update Cherry Studio to version 1.5.1 or later, where the vulnerability is patched. 2. URL handling restrictions: Implement endpoint security policies that restrict or monitor the invocation of custom URL handlers, especially those linked to Cherry Studio, to prevent automatic or unintended execution. 3. User awareness training: Educate users about the risks of clicking unknown or suspicious links, particularly those that could trigger application-specific handlers. 4. Network segmentation: Limit the exposure of endpoints running Cherry Studio by segmenting networks and applying strict access controls to reduce the attack surface. 5. Endpoint detection and response (EDR): Deploy and tune EDR solutions to detect anomalous behaviors indicative of code injection or remote code execution attempts. 6. Application whitelisting: Use application control mechanisms to prevent unauthorized code execution or the launching of unexpected processes triggered by URL handlers. 7. Monitor for Indicators of Compromise (IoCs): Although no exploits are known in the wild, monitor logs and network traffic for suspicious URL handler invocations or unusual process executions related to Cherry Studio. 8. Incident response readiness: Prepare and test incident response plans to quickly contain and remediate any exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-07-16T13:22:18.204Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689a3048ad5a09ad0027c678
Added to database: 8/11/2025, 6:02:48 PM
Last enriched: 8/11/2025, 6:19:02 PM
Last updated: 8/11/2025, 7:13:00 PM
Views: 4
Related Threats
CVE-2025-8854: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in bulletphysics bullet3
HighCVE-2025-8830: OS Command Injection in Linksys RE6250
MediumCVE-2025-54878: CWE-122: Heap-based Buffer Overflow in nasa CryptoLib
HighResearchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls
HighCVE-2025-40920: CWE-340 Generation of Predictable Numbers or Identifiers in ETHER Catalyst::Authentication::Credential::HTTP
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.