CVE-2025-67744: CWE-94: Improper Control of Generation of Code ('Code Injection') in ThinkInAIXYZ deepchat
DeepChat is an open-source artificial intelligence agent platform that unifies models, tools, and agents. Prior to version 0.5.3, a security vulnerability exists in the Mermaid diagram rendering component that allows arbitrary JavaScript execution. Due to the exposure of the Electron IPC renderer to the DOM, this Cross-Site Scripting (XSS) flaw escalates to full Remote Code Execution (RCE), allowing an attacker to execute arbitrary system commands. Two concurrent issues, unsafe Mermaid configuration and an exposed IPC interface, cause this issue. Version 0.5.3 contains a patch.
AI Analysis
Technical Summary
CVE-2025-67744 is a critical vulnerability affecting DeepChat, an open-source AI agent platform developed by ThinkInAIXYZ. The issue stems from the Mermaid diagram rendering component, which prior to version 0.5.3, is configured unsafely, allowing arbitrary JavaScript execution. This vulnerability is compounded by the exposure of the Electron IPC renderer interface to the DOM, which escalates what would normally be a Cross-Site Scripting (XSS) flaw into a full Remote Code Execution (RCE) vulnerability. Specifically, the unsafe Mermaid configuration permits injection of malicious scripts, and the Electron IPC interface, which facilitates communication between the renderer and main processes, is improperly exposed, enabling attackers to execute arbitrary system commands on the host machine. The vulnerability requires user interaction (e.g., rendering a malicious Mermaid diagram) but does not require authentication, making it accessible to remote attackers. The CVSS 3.1 base score of 9.7 reflects the critical nature of this flaw, with network attack vector, low attack complexity, no privileges required, and scope change indicating that the vulnerability affects components beyond the initial vulnerable code. The impact includes full compromise of confidentiality, integrity, and availability of affected systems. The vendor has addressed this vulnerability in DeepChat version 0.5.3 by patching the unsafe Mermaid configuration and securing the IPC interface. No known exploits have been reported in the wild as of the publication date, but the severity and ease of exploitation make this a high-priority issue for users of DeepChat.
Potential Impact
For European organizations, the impact of CVE-2025-67744 is substantial. DeepChat is used in AI research, development, and deployment environments, which often handle sensitive intellectual property and personal data. Successful exploitation could lead to complete system compromise, data theft, manipulation, or destruction, and disruption of AI services. This could affect confidentiality of proprietary AI models and datasets, integrity of AI outputs, and availability of AI platforms critical for business operations. The vulnerability's ability to execute arbitrary system commands remotely without authentication increases the risk of widespread compromise, lateral movement within networks, and potential deployment of ransomware or other malware. Organizations in sectors such as technology, finance, healthcare, and government that leverage AI platforms are particularly at risk. Additionally, the integration of DeepChat in development pipelines or internal tools could expose critical infrastructure to attackers. The lack of known exploits currently provides a window for proactive mitigation, but the critical severity demands immediate action to prevent potential future attacks.
Mitigation Recommendations
To mitigate CVE-2025-67744, organizations should immediately upgrade DeepChat to version 0.5.3 or later, where the vulnerability has been patched. Beyond patching, organizations should audit and restrict Electron IPC interfaces to ensure they are not unnecessarily exposed to the DOM or untrusted content. Implement strict content security policies (CSP) to limit script execution and reduce XSS attack surfaces. Validate and sanitize all user inputs, especially those that can influence Mermaid diagram rendering or other dynamic content. Employ network segmentation to isolate AI development environments from broader enterprise networks to limit lateral movement if compromise occurs. Monitor logs and system behavior for unusual IPC activity or unexpected command executions. Educate developers and users about the risks of rendering untrusted Mermaid diagrams or other dynamic content within Electron-based applications. Finally, maintain an up-to-date inventory of software dependencies and apply security patches promptly to reduce exposure to known vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland
CVE-2025-67744: CWE-94: Improper Control of Generation of Code ('Code Injection') in ThinkInAIXYZ deepchat
Description
DeepChat is an open-source artificial intelligence agent platform that unifies models, tools, and agents. Prior to version 0.5.3, a security vulnerability exists in the Mermaid diagram rendering component that allows arbitrary JavaScript execution. Due to the exposure of the Electron IPC renderer to the DOM, this Cross-Site Scripting (XSS) flaw escalates to full Remote Code Execution (RCE), allowing an attacker to execute arbitrary system commands. Two concurrent issues, unsafe Mermaid configuration and an exposed IPC interface, cause this issue. Version 0.5.3 contains a patch.
AI-Powered Analysis
Technical Analysis
CVE-2025-67744 is a critical vulnerability affecting DeepChat, an open-source AI agent platform developed by ThinkInAIXYZ. The issue stems from the Mermaid diagram rendering component, which prior to version 0.5.3, is configured unsafely, allowing arbitrary JavaScript execution. This vulnerability is compounded by the exposure of the Electron IPC renderer interface to the DOM, which escalates what would normally be a Cross-Site Scripting (XSS) flaw into a full Remote Code Execution (RCE) vulnerability. Specifically, the unsafe Mermaid configuration permits injection of malicious scripts, and the Electron IPC interface, which facilitates communication between the renderer and main processes, is improperly exposed, enabling attackers to execute arbitrary system commands on the host machine. The vulnerability requires user interaction (e.g., rendering a malicious Mermaid diagram) but does not require authentication, making it accessible to remote attackers. The CVSS 3.1 base score of 9.7 reflects the critical nature of this flaw, with network attack vector, low attack complexity, no privileges required, and scope change indicating that the vulnerability affects components beyond the initial vulnerable code. The impact includes full compromise of confidentiality, integrity, and availability of affected systems. The vendor has addressed this vulnerability in DeepChat version 0.5.3 by patching the unsafe Mermaid configuration and securing the IPC interface. No known exploits have been reported in the wild as of the publication date, but the severity and ease of exploitation make this a high-priority issue for users of DeepChat.
Potential Impact
For European organizations, the impact of CVE-2025-67744 is substantial. DeepChat is used in AI research, development, and deployment environments, which often handle sensitive intellectual property and personal data. Successful exploitation could lead to complete system compromise, data theft, manipulation, or destruction, and disruption of AI services. This could affect confidentiality of proprietary AI models and datasets, integrity of AI outputs, and availability of AI platforms critical for business operations. The vulnerability's ability to execute arbitrary system commands remotely without authentication increases the risk of widespread compromise, lateral movement within networks, and potential deployment of ransomware or other malware. Organizations in sectors such as technology, finance, healthcare, and government that leverage AI platforms are particularly at risk. Additionally, the integration of DeepChat in development pipelines or internal tools could expose critical infrastructure to attackers. The lack of known exploits currently provides a window for proactive mitigation, but the critical severity demands immediate action to prevent potential future attacks.
Mitigation Recommendations
To mitigate CVE-2025-67744, organizations should immediately upgrade DeepChat to version 0.5.3 or later, where the vulnerability has been patched. Beyond patching, organizations should audit and restrict Electron IPC interfaces to ensure they are not unnecessarily exposed to the DOM or untrusted content. Implement strict content security policies (CSP) to limit script execution and reduce XSS attack surfaces. Validate and sanitize all user inputs, especially those that can influence Mermaid diagram rendering or other dynamic content. Employ network segmentation to isolate AI development environments from broader enterprise networks to limit lateral movement if compromise occurs. Monitor logs and system behavior for unusual IPC activity or unexpected command executions. Educate developers and users about the risks of rendering untrusted Mermaid diagrams or other dynamic content within Electron-based applications. Finally, maintain an up-to-date inventory of software dependencies and apply security patches promptly to reduce exposure to known vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-11T18:08:02.946Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6940b2a5d9bcdf3f3d15a2eb
Added to database: 12/16/2025, 1:15:17 AM
Last enriched: 12/16/2025, 1:30:34 AM
Last updated: 12/16/2025, 10:34:20 AM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14002: CWE-287 Improper Authentication in whyun WPCOM Member
HighCVE-2025-13231: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in radykal Fancy Product Designer
MediumCVE-2025-68088: Missing Authorization in merkulove Huger for Elementor
UnknownCVE-2025-68087: Missing Authorization in merkulove Modalier for Elementor
UnknownCVE-2025-68086: Missing Authorization in merkulove Reformer for Elementor
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.