Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-61929 β€” AI Deep Analysis Summary

CVSS 9.7 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Cherry Studio suffers from a **Code Injection** flaw. When processing `cherrystudio://mcp` URLs, it blindly executes commands found in **Base64-encoded** config data.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-94** (Code Injection). The application fails to sanitize input when handling the `cherrystudio://mcp` protocol.…

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: Users of **Cherry Studio** (developed by **CherryHQ** / 千彗). Specifically, the component handling **MCP (Model Context Protocol)** URL schemes.…

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: With **High Privileges**, hackers can execute **arbitrary commands** on the victim's machine.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Exploitation Threshold**: **Medium**. Requires **User Interaction (UI:R)** – the victim must click a malicious link or open a crafted `cherrystudio://mcp` URL.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

🌐 **Public Exploit**: Currently, **No Public PoC/Exploit** is listed in the provided data.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for applications using **Cherry Studio**. Look for custom URL handlers registered for `cherrystudio://`.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Official Fix**: Yes. CherryHQ has published a security advisory (**GHSA-hh6w-rmjc-26f6**). πŸ“₯ **Action**: Update Cherry Studio to the latest patched version immediately.…

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: Disable or unregister the `cherrystudio://` protocol handler if possible. 🚫 **User Education**: Warn users not to click unknown links or open files containing `cherrystudio://mcp` URLs.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. CVSS Vector `AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H` indicates a **Critical** severity score. πŸš€ **Priority**: Patch immediately.…