Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-54382 β€” AI Deep Analysis Summary

CVSS 9.7 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Cherry Studio v1.5.1 suffers from **OS Command Injection** (CWE-78).…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **Improper Neutralization of Special Elements** (CWE-78). The application fails to sanitize URLs when establishing the **streamableHttp MCP server connection**.…

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: Users of **Cherry Studio version 1.5.1**. 🏒 **Vendor**: CherryHQ (Cherry Studio). πŸ“¦ **Component**: The streamableHttp MCP server connection module.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Privileges**: **High** (CVSS A:H). Attackers gain the ability to execute arbitrary commands. πŸ“‚ **Data**: **High** (CVSS C:H/I:H).…

Q5Is exploitation threshold high? (Auth/Config)

⚠️ **Threshold**: **Low** (CVSS AC:L). However, it requires **User Interaction** (UI:R). πŸ–±οΈ The victim must likely initiate or approve the MCP server connection with a malicious URL.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exploit**: **No**. The `pocs` field is empty. πŸ“„ **Advisory**: A GitHub Security Advisory (GHSA-gjp6-9cvg-8w93) exists, but no public Proof-of-Concept (PoC) or wild exploitation code is currently available.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Verify if you are running **Cherry Studio v1.5.1**. πŸ›‘ Check for any custom or third-party MCP server configurations using the `streamableHttp` protocol.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ›‘οΈ **Official Fix**: **Yes**. The vendor has published a security advisory on GitHub. πŸ“ **Action**: Update to the patched version immediately. Refer to the GHSA link for specific patch details.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If patching is delayed, **disable** or **restrict** the use of the `streamableHttp` MCP server connection. 🚫 Do not input URLs from untrusted sources into the connection field.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. CVSS Score is **Critical** (9.8 implied by H/H/H). 🚨 Even though User Interaction is required, the impact is severe (RCE). πŸƒβ€β™‚οΈ **Priority**: Patch immediately upon release. Monitor for updates.