Description

A severe security vulnerability, tracked as CVE-2025-61929 and rated CVSS 9.7, has been discovered in Cherry Studio a cross-platform desktop client supporting multiple large language model (LLM) providers. The flaw allows attackers to execute arbitrary commands through a single click on a specially crafted link using the custom URL protocol. This protocol is designed for managing Cherry Studio’s MCP (Model Control Panel) installation but fails to properly validate base64-encoded configuration data before executing embedded commands. According to the official advisory, the exploit chain is similar to a previously reported vulnerability (GHSA-p6vw-w3p8-4g72). When a user clicks a malicious link, the base64-encoded payload is parsed and directly executed without further prompts or warnings. In a proof-of-concept (POC), a crafted link was able to launch the Windows calculator app. However, the advisory warns of more dangerous capabilities, such as establishing persistent access via scheduled tasks. Even if a user attempts to cancel the installation, the command still executes, making this a highly reliable attack vector with minimal interaction required. The vulnerability affects Cherry Studio versions on Windows, macOS, and Linux. No official patch has been released at the time of writing. Users are strongly advised to avoid clicking on any links from untrusted sources. Additionally, disabling the custom protocol handler or running the application within a sandboxed environment is recommended to mitigate the risk. Given its ease of exploitation and potential for serious impact, this vulnerability demands immediate attention and cautious use of Cherry Studio until a fix becomes available.