A severe security vulnerability, tracked as CVE-2025-61929 and rated CVSS 9.7, has been discovered in Cherry Studio a cross-platform desktop client supporting multiple large language model (LLM) providers. The flaw allows attackers to execute arbitrary commands through a single click on a specially crafted link using the custom URL protocol. This protocol is designed for managing Cherry Studio’s MCP (Model Control Panel) installation but fails to properly validate base64-encoded configuration data before executing embedded commands. According to the official advisory, the exploit chain is similar to a previously reported vulnerability (GHSA-p6vw-w3p8-4g72). When a user clicks a malicious link, the base64-encoded payload is parsed and directly executed without further prompts or warnings. In a proof-of-concept (POC), a crafted link was able to launch the Windows calculator app. However, the advisory warns of more dangerous capabilities, such as establishing persistent access via scheduled tasks. Even if a user attempts to cancel the installation, the command still executes, making this a highly reliable attack vector with minimal interaction required. The vulnerability affects Cherry Studio versions on Windows, macOS, and Linux. No official patch has been released at the time of writing. Users are strongly advised to avoid clicking on any links from untrusted sources. Additionally, disabling the custom protocol handler or running the application within a sandboxed environment is recommended to mitigate the risk. Given its ease of exploitation and potential for serious impact, this vulnerability demands immediate attention and cautious use of Cherry Studio until a fix becomes available.
Cybersecurity researchers have identified a new campaign distributing the Astaroth banking trojan, which uses GitHub as a resilient infrastructure to bypass traditional takedown ef...
Kearney Public Schools (KPS) is grappling with a cybersecurity incident that has severely disrupted its technology infrastructure, affecting phones, computers, and digital systems ...
A vulnerability in authentication bypass (CVE-2025-61928) had existed in the popular TypeScript auth library Better Auth. The flaw permitted unauthenticated actors to set or genera...