This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Cherry Studio suffers from a **Code Injection** flaw. When processing `cherrystudio://mcp` URLs, it blindly executes commands found in **Base64-encoded** config data.β¦
π **Exploitation Threshold**: **Medium**. Requires **User Interaction (UI:R)** β the victim must click a malicious link or open a crafted `cherrystudio://mcp` URL.β¦
β **Official Fix**: Yes. CherryHQ has published a security advisory (**GHSA-hh6w-rmjc-26f6**). π₯ **Action**: Update Cherry Studio to the latest patched version immediately.β¦
π§ **No Patch Workaround**: Disable or unregister the `cherrystudio://` protocol handler if possible. π« **User Education**: Warn users not to click unknown links or open files containing `cherrystudio://mcp` URLs.β¦