Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67744: CWE-94: Improper Control of Generation of Code ('Code Injection') in ThinkInAIXYZ deepchat

0
Critical
VulnerabilityCVE-2025-67744cvecve-2025-67744cwe-94
Published: Tue Dec 16 2025 (12/16/2025, 00:42:21 UTC)
Source: CVE Database V5
Vendor/Project: ThinkInAIXYZ
Product: deepchat

Description

DeepChat is an open-source artificial intelligence agent platform that unifies models, tools, and agents. Prior to version 0.5.3, a security vulnerability exists in the Mermaid diagram rendering component that allows arbitrary JavaScript execution. Due to the exposure of the Electron IPC renderer to the DOM, this Cross-Site Scripting (XSS) flaw escalates to full Remote Code Execution (RCE), allowing an attacker to execute arbitrary system commands. Two concurrent issues, unsafe Mermaid configuration and an exposed IPC interface, cause this issue. Version 0.5.3 contains a patch.

AI-Powered Analysis

AILast updated: 12/16/2025, 01:30:34 UTC

Technical Analysis

CVE-2025-67744 is a critical vulnerability affecting DeepChat, an open-source AI agent platform developed by ThinkInAIXYZ. The issue stems from the Mermaid diagram rendering component, which prior to version 0.5.3, is configured unsafely, allowing arbitrary JavaScript execution. This vulnerability is compounded by the exposure of the Electron IPC renderer interface to the DOM, which escalates what would normally be a Cross-Site Scripting (XSS) flaw into a full Remote Code Execution (RCE) vulnerability. Specifically, the unsafe Mermaid configuration permits injection of malicious scripts, and the Electron IPC interface, which facilitates communication between the renderer and main processes, is improperly exposed, enabling attackers to execute arbitrary system commands on the host machine. The vulnerability requires user interaction (e.g., rendering a malicious Mermaid diagram) but does not require authentication, making it accessible to remote attackers. The CVSS 3.1 base score of 9.7 reflects the critical nature of this flaw, with network attack vector, low attack complexity, no privileges required, and scope change indicating that the vulnerability affects components beyond the initial vulnerable code. The impact includes full compromise of confidentiality, integrity, and availability of affected systems. The vendor has addressed this vulnerability in DeepChat version 0.5.3 by patching the unsafe Mermaid configuration and securing the IPC interface. No known exploits have been reported in the wild as of the publication date, but the severity and ease of exploitation make this a high-priority issue for users of DeepChat.

Potential Impact

For European organizations, the impact of CVE-2025-67744 is substantial. DeepChat is used in AI research, development, and deployment environments, which often handle sensitive intellectual property and personal data. Successful exploitation could lead to complete system compromise, data theft, manipulation, or destruction, and disruption of AI services. This could affect confidentiality of proprietary AI models and datasets, integrity of AI outputs, and availability of AI platforms critical for business operations. The vulnerability's ability to execute arbitrary system commands remotely without authentication increases the risk of widespread compromise, lateral movement within networks, and potential deployment of ransomware or other malware. Organizations in sectors such as technology, finance, healthcare, and government that leverage AI platforms are particularly at risk. Additionally, the integration of DeepChat in development pipelines or internal tools could expose critical infrastructure to attackers. The lack of known exploits currently provides a window for proactive mitigation, but the critical severity demands immediate action to prevent potential future attacks.

Mitigation Recommendations

To mitigate CVE-2025-67744, organizations should immediately upgrade DeepChat to version 0.5.3 or later, where the vulnerability has been patched. Beyond patching, organizations should audit and restrict Electron IPC interfaces to ensure they are not unnecessarily exposed to the DOM or untrusted content. Implement strict content security policies (CSP) to limit script execution and reduce XSS attack surfaces. Validate and sanitize all user inputs, especially those that can influence Mermaid diagram rendering or other dynamic content. Employ network segmentation to isolate AI development environments from broader enterprise networks to limit lateral movement if compromise occurs. Monitor logs and system behavior for unusual IPC activity or unexpected command executions. Educate developers and users about the risks of rendering untrusted Mermaid diagrams or other dynamic content within Electron-based applications. Finally, maintain an up-to-date inventory of software dependencies and apply security patches promptly to reduce exposure to known vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-11T18:08:02.946Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6940b2a5d9bcdf3f3d15a2eb

Added to database: 12/16/2025, 1:15:17 AM

Last enriched: 12/16/2025, 1:30:34 AM

Last updated: 12/16/2025, 10:34:20 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats