Skip to main content

CVE-2025-55733: CWE-94: Improper Control of Generation of Code ('Code Injection') in ThinkInAIXYZ deepchat

Critical
VulnerabilityCVE-2025-55733cvecve-2025-55733cwe-94
Published: Tue Aug 19 2025 (08/19/2025, 18:26:38 UTC)
Source: CVE Database V5
Vendor/Project: ThinkInAIXYZ
Product: deepchat

Description

DeepChat is a smart assistant that connects powerful AI to your personal world. DeepChat before 0.3.1 has a one-click remote code execution vulnerability. An attacker can exploit this vulnerability by embedding a specially crafted deepchat: URL on any website, including a malicious one they control. When a victim visits such a site or clicks on the link, the browser triggers the app’s custom URL handler (deepchat:), causing the DeepChat application to launch and process the URL, leading to remote code execution on the victim’s machine. This vulnerability is fixed in 0.3.1.

AI-Powered Analysis

AILast updated: 08/19/2025, 18:47:47 UTC

Technical Analysis

CVE-2025-55733 is a critical remote code execution (RCE) vulnerability affecting versions of the ThinkInAIXYZ DeepChat application prior to 0.3.1. DeepChat is a smart assistant application that integrates AI capabilities with users' personal environments. The vulnerability arises from improper control over code generation (CWE-94), specifically through the application's handling of its custom URL scheme 'deepchat:'. An attacker can craft a malicious deepchat: URL and embed it within a website they control. When a victim visits this malicious site or clicks the link, the browser invokes the DeepChat application via its custom URL handler. Due to insufficient validation and sanitization of the URL input, the application processes the crafted URL in a way that allows arbitrary code execution on the victim's machine. This exploitation requires no prior authentication but does require user interaction (clicking or visiting the malicious link). The vulnerability has a CVSS 3.1 base score of 9.7, reflecting its critical severity with high impact on confidentiality, integrity, and availability, and low attack complexity. Although no known exploits are currently reported in the wild, the ease of exploitation and the potential damage make this a significant threat. The vulnerability is addressed in DeepChat version 0.3.1, which includes proper input validation and sanitization to prevent code injection via the custom URL handler.

Potential Impact

For European organizations, this vulnerability poses a severe risk. If employees or users have DeepChat installed and use versions prior to 0.3.1, attackers could leverage this flaw to execute arbitrary code remotely, potentially leading to full system compromise. This could result in data breaches, unauthorized access to sensitive information, disruption of business operations, and lateral movement within corporate networks. Given DeepChat's role as a personal AI assistant, attackers might also gain access to personal data, credentials, or other integrated services. The attack vector via malicious websites or links makes phishing campaigns a likely exploitation method, increasing the risk of widespread compromise. Organizations relying on DeepChat for productivity or AI assistance should consider this vulnerability a critical threat to endpoint security, particularly in sectors with high data sensitivity such as finance, healthcare, and government.

Mitigation Recommendations

1. Immediate upgrade: Ensure all DeepChat installations are updated to version 0.3.1 or later, where the vulnerability is patched. 2. URL handler restrictions: Implement endpoint protection policies to restrict or monitor the invocation of custom URL handlers like 'deepchat:' to prevent unauthorized or suspicious activations. 3. User awareness training: Educate users about the risks of clicking unknown or suspicious links, especially those that may invoke external applications. 4. Network controls: Use web filtering and email security solutions to block or flag URLs containing the 'deepchat:' scheme or suspicious deepchat: URLs. 5. Application whitelisting: Employ application control mechanisms to restrict execution of unauthorized code or scripts spawned by DeepChat. 6. Incident response readiness: Prepare detection rules and monitoring for unusual DeepChat process activity or unexpected network connections originating from endpoints. 7. Vendor communication: Maintain contact with ThinkInAIXYZ for any further patches or advisories and verify the integrity of updates before deployment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-14T22:31:17.683Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a4c34fad5a09ad00fa175d

Added to database: 8/19/2025, 6:32:47 PM

Last enriched: 8/19/2025, 6:47:47 PM

Last updated: 8/20/2025, 5:04:59 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats