CVE-2025-54074: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in CherryHQ cherry-studio
Cherry Studio is a desktop client that supports for multiple LLM providers. From versions 1.2.5 to 1.5.1, Cherry Studio is vulnerable to OS Command Injection during a connection with a malicious MCP server in HTTP Streamable mode. Attackers can setup a malicious MCP server with compatible OAuth authorization server endpoints and trick victims into connecting it, leading to OS command injection in vulnerable clients. This issue has been patched in version 1.5.2.
AI Analysis
Technical Summary
CVE-2025-54074 is a high-severity OS Command Injection vulnerability affecting Cherry Studio, a desktop client developed by CherryHQ that supports multiple large language model (LLM) providers. The vulnerability exists in versions 1.2.5 through 1.5.1 and arises when the client connects to a malicious MCP (Model Communication Protocol) server operating in HTTP Streamable mode. Specifically, the flaw is due to improper neutralization of special elements used in OS commands (CWE-78), allowing an attacker to inject arbitrary OS commands. The attack vector involves an adversary setting up a malicious MCP server with compatible OAuth authorization endpoints to trick victims into establishing a connection. Once connected, the attacker can exploit the injection flaw to execute arbitrary commands on the victim's machine with the privileges of the Cherry Studio client process. This can lead to full system compromise, data theft, or further lateral movement. The vulnerability requires user interaction (connecting to the malicious MCP server) but does not require prior authentication or elevated privileges. The issue has been patched in version 1.5.2 of Cherry Studio. The CVSS 4.0 base score is 7.7, reflecting the network attack vector, low attack complexity, partial user interaction, and high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the potential impact is significant given the ability to execute arbitrary OS commands remotely via a crafted server.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially those using Cherry Studio as part of their AI or LLM integration workflows. Successful exploitation could lead to unauthorized access to sensitive data, disruption of critical AI services, and potential lateral movement within corporate networks. Given the integration with multiple LLM providers, attackers might also manipulate AI-driven processes or exfiltrate proprietary information. The risk is heightened in sectors relying heavily on AI tools, such as finance, healthcare, and technology firms. Additionally, the vulnerability could be leveraged in targeted attacks against organizations collaborating with or developing AI technologies, potentially impacting intellectual property and operational continuity. The requirement for user interaction (connecting to a malicious MCP server) means phishing or social engineering could be used to induce victims to connect, increasing the attack surface. The lack of known exploits in the wild currently provides a window for proactive mitigation.
Mitigation Recommendations
1. Immediate upgrade to Cherry Studio version 1.5.2 or later, where the vulnerability is patched. 2. Implement strict network controls to restrict connections to only trusted MCP servers, including whitelisting known safe endpoints and blocking unknown or suspicious MCP server addresses. 3. Enforce multi-factor authentication and user training to reduce the risk of social engineering attacks that might trick users into connecting to malicious servers. 4. Monitor network traffic for unusual MCP connection attempts or OAuth authorization flows that deviate from normal patterns. 5. Employ endpoint detection and response (EDR) solutions to detect and respond to suspicious OS command executions originating from Cherry Studio processes. 6. Conduct regular security audits and vulnerability assessments on AI integration tools and their communication protocols. 7. Establish incident response plans specifically addressing AI client compromise scenarios to minimize impact if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2025-54074: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in CherryHQ cherry-studio
Description
Cherry Studio is a desktop client that supports for multiple LLM providers. From versions 1.2.5 to 1.5.1, Cherry Studio is vulnerable to OS Command Injection during a connection with a malicious MCP server in HTTP Streamable mode. Attackers can setup a malicious MCP server with compatible OAuth authorization server endpoints and trick victims into connecting it, leading to OS command injection in vulnerable clients. This issue has been patched in version 1.5.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-54074 is a high-severity OS Command Injection vulnerability affecting Cherry Studio, a desktop client developed by CherryHQ that supports multiple large language model (LLM) providers. The vulnerability exists in versions 1.2.5 through 1.5.1 and arises when the client connects to a malicious MCP (Model Communication Protocol) server operating in HTTP Streamable mode. Specifically, the flaw is due to improper neutralization of special elements used in OS commands (CWE-78), allowing an attacker to inject arbitrary OS commands. The attack vector involves an adversary setting up a malicious MCP server with compatible OAuth authorization endpoints to trick victims into establishing a connection. Once connected, the attacker can exploit the injection flaw to execute arbitrary commands on the victim's machine with the privileges of the Cherry Studio client process. This can lead to full system compromise, data theft, or further lateral movement. The vulnerability requires user interaction (connecting to the malicious MCP server) but does not require prior authentication or elevated privileges. The issue has been patched in version 1.5.2 of Cherry Studio. The CVSS 4.0 base score is 7.7, reflecting the network attack vector, low attack complexity, partial user interaction, and high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the potential impact is significant given the ability to execute arbitrary OS commands remotely via a crafted server.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially those using Cherry Studio as part of their AI or LLM integration workflows. Successful exploitation could lead to unauthorized access to sensitive data, disruption of critical AI services, and potential lateral movement within corporate networks. Given the integration with multiple LLM providers, attackers might also manipulate AI-driven processes or exfiltrate proprietary information. The risk is heightened in sectors relying heavily on AI tools, such as finance, healthcare, and technology firms. Additionally, the vulnerability could be leveraged in targeted attacks against organizations collaborating with or developing AI technologies, potentially impacting intellectual property and operational continuity. The requirement for user interaction (connecting to a malicious MCP server) means phishing or social engineering could be used to induce victims to connect, increasing the attack surface. The lack of known exploits in the wild currently provides a window for proactive mitigation.
Mitigation Recommendations
1. Immediate upgrade to Cherry Studio version 1.5.2 or later, where the vulnerability is patched. 2. Implement strict network controls to restrict connections to only trusted MCP servers, including whitelisting known safe endpoints and blocking unknown or suspicious MCP server addresses. 3. Enforce multi-factor authentication and user training to reduce the risk of social engineering attacks that might trick users into connecting to malicious servers. 4. Monitor network traffic for unusual MCP connection attempts or OAuth authorization flows that deviate from normal patterns. 5. Employ endpoint detection and response (EDR) solutions to detect and respond to suspicious OS command executions originating from Cherry Studio processes. 6. Conduct regular security audits and vulnerability assessments on AI integration tools and their communication protocols. 7. Establish incident response plans specifically addressing AI client compromise scenarios to minimize impact if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-07-16T13:22:18.205Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689c9784ad5a09ad00420ca6
Added to database: 8/13/2025, 1:47:48 PM
Last enriched: 8/13/2025, 2:03:48 PM
Last updated: 8/13/2025, 2:50:01 PM
Views: 4
Related Threats
CVE-2025-50614: n/a
MediumCVE-2025-8918: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2025-50613: n/a
MediumCVE-2025-50612: n/a
HighCVE-2025-51452: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.