Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 04 Dec 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cherry-ai
Cherry-ai cherry Studio |
|
| CPEs | cpe:2.3:a:cherry-ai:cherry_studio:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Cherry-ai
Cherry-ai cherry Studio |
Fri, 10 Oct 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Oct 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cherry Studio is a desktop client that supports for multiple LLM providers. Cherry Studio registers a custom protocol called `cherrystudio://`. When handling the MCP installation URL, it parses the base64-encoded configuration data and directly executes the command within it. In the files `src/main/services/ProtocolClient.ts` and `src/main/services/urlschema/mcp-install.ts`, when receiving a URL of the `cherrystudio://mcp` type, the `handleMcpProtocolUrl` function is called for processing. If an attacker crafts malicious content and posts it on a website or elsewhere (there are many exploitation methods, such as creating a malicious website with a button containing this malicious content), when the user clicks it, since the pop-up window contains normal content, the direct click is considered a scene action, and the malicious command is directly triggered, leading to the user being compromised. As of time of publication, no known patched versions exist. | |
| Title | Cherry Studio allows one-click on a specific URL to cause a command to execute | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-10T20:46:08.118Z
Reserved: 2025-10-03T22:21:59.617Z
Link: CVE-2025-61929
Updated: 2025-10-10T20:46:03.765Z
Status : Analyzed
Published: 2025-10-10T20:15:38.613
Modified: 2025-12-04T17:47:27.223
Link: CVE-2025-61929
No data.
OpenCVE Enrichment
No data.