Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66222: CWE-94: Improper Control of Generation of Code ('Code Injection') in ThinkInAIXYZ deepchat

0
Critical
VulnerabilityCVE-2025-66222cvecve-2025-66222cwe-94
Published: Wed Dec 03 2025 (12/03/2025, 18:34:44 UTC)
Source: CVE Database V5
Vendor/Project: ThinkInAIXYZ
Product: deepchat

Description

DeepChat is a smart assistant uses artificial intelligence. In 0.5.0 and earlier, there is a Stored Cross-Site Scripting (XSS) vulnerability in the Mermaid diagram renderer allows an attacker to execute arbitrary JavaScript within the application context. By leveraging the exposed Electron IPC bridge, this XSS can be escalated to Remote Code Execution (RCE) by registering and starting a malicious MCP (Model Context Protocol) server.

AI-Powered Analysis

AILast updated: 12/03/2025, 19:14:15 UTC

Technical Analysis

CVE-2025-66222 is a critical security vulnerability identified in the DeepChat AI assistant developed by ThinkInAIXYZ, affecting versions earlier than 0.5.0. The root cause is a stored Cross-Site Scripting (XSS) vulnerability within the Mermaid diagram renderer component, which allows an attacker to inject and persist malicious JavaScript code that executes in the context of the DeepChat application. This XSS flaw is particularly dangerous because DeepChat is built on Electron, a framework that combines Chromium and Node.js, exposing an IPC (Inter-Process Communication) bridge. Attackers can leverage this IPC bridge to escalate the XSS to Remote Code Execution (RCE) by registering and launching a malicious Model Context Protocol (MCP) server. This escalation means that an attacker can execute arbitrary code on the host machine running DeepChat, potentially taking full control of the system. The vulnerability does not require prior authentication but does require user interaction, such as viewing or interacting with malicious Mermaid diagrams. The CVSS v3.1 score of 9.7 reflects the critical nature of this vulnerability, with network attack vector, low attack complexity, no privileges required, and user interaction needed. The impact spans confidentiality, integrity, and availability, as attackers can steal sensitive data, manipulate application behavior, or disrupt service. No patches or exploit code are currently publicly available, but the threat is significant given the potential for full system compromise. The vulnerability is classified under CWE-94, indicating improper control of code generation, which is a severe security weakness in software development. Organizations using DeepChat, especially in environments where untrusted content is rendered or shared, are at heightened risk.

Potential Impact

For European organizations, the impact of CVE-2025-66222 is substantial. DeepChat users could face complete system compromise if attackers exploit this vulnerability, leading to data breaches, intellectual property theft, and operational disruptions. Sectors such as finance, healthcare, government, and critical infrastructure that increasingly integrate AI assistants like DeepChat into workflows are particularly vulnerable. Confidential information processed or stored by DeepChat could be exposed or manipulated, undermining trust and compliance with regulations such as GDPR. The ability to execute arbitrary code remotely also raises the risk of deploying ransomware or other malware, causing downtime and financial losses. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to trick users into triggering the exploit. The lack of known exploits in the wild currently provides a window for proactive defense, but the high severity demands urgent mitigation to prevent potential attacks.

Mitigation Recommendations

1. Upgrade DeepChat to version 0.5.0 or later as soon as an official patch addressing CVE-2025-66222 is released by ThinkInAIXYZ. 2. Until a patch is available, restrict or disable the rendering of Mermaid diagrams from untrusted or external sources to prevent injection of malicious scripts. 3. Implement strict Content Security Policies (CSP) within the Electron application to limit the execution of inline scripts and restrict IPC communication to trusted endpoints only. 4. Employ application-level sandboxing to isolate the DeepChat process and minimize the impact of potential code execution. 5. Educate users about the risks of interacting with untrusted content and implement phishing awareness training to reduce the likelihood of user interaction exploitation. 6. Monitor network and application logs for unusual IPC activity or attempts to register unauthorized MCP servers. 7. Use endpoint detection and response (EDR) tools to detect anomalous behavior indicative of exploitation attempts. 8. Coordinate with vendors and security teams to ensure timely vulnerability disclosure and patch management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-24T23:01:29.679Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693088877d648701e003bbe1

Added to database: 12/3/2025, 6:59:19 PM

Last enriched: 12/3/2025, 7:14:15 PM

Last updated: 12/4/2025, 11:03:23 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats