CodeNewbie Community 🌱

Sharon428931
Sharon428931

Posted on

Cherry Studio v1.5.1 Users: Patch Now or Risk RCE

> About Author
Hi, I'm Sharon, a product manager at Chaitin Tech. We build SafeLine, an open-source Web Application Firewall built for real-world threats. While SafeLine focuses on HTTP-layer protection, our emergency response center monitors and responds to RCE and authentication vulnerabilities across the stack to help developers stay safe.

Cherry Studio is a cross-platform AI desktop assistant that supports multiple mainstream LLMs and runs on Windows, macOS, and Linux.

In August 2025, the Cherry Studio team disclosed a high-severity security advisory for CVE-2025-54074, affecting all versions ≤ v1.5.1.

This vulnerability allows a malicious MCP server to execute arbitrary system commands on the victim’s machine.

If you’re running an affected version, upgrade immediately to avoid compromise.


Vulnerability Description

Root Cause

In v1.5.1 and earlier, the MCP client (in HTTP Streamable mode) failed to validate the OAuth metadata returned by an MCP server — specifically the authorization_endpoint URL.

This URL was passed directly into the open() function without proper sanitization.

A threat actor could craft a malicious authentication URL containing injected commands, trick a user into connecting to their rogue MCP server, and trigger arbitrary command execution on the client’s machine.


Impact

If exploited, an attacker could:

  • Run arbitrary OS commands on the target system
  • Gain full control of the victim’s machine
  • Steal sensitive data
  • Compromise business systems

Risk Level: High

Attack Vector: Remote network

Authentication Required: None

User Interaction: Required (victim must connect to malicious MCP server)

Exploit Availability: Public POC/EXP confirmed

Fix Difficulty: Low (official patch available)


Affected Versions

  • Cherry Studio ≤ v1.5.1

Mitigation & Fix

Temporary Workaround:

  • Remove untrusted MCP servers from Cherry Studio’s configuration.

Permanent Fix:


Proof of Concept (POC)


References

  1. Cherry Studio GitHub Security Advisory

TL;DR

If you’re running Cherry Studio ≤ v1.5.1, you’re vulnerable to a remote command injection attack via malicious MCP servers.

Patch to v1.5.2+ immediately.


Join the SafeLine Community

If you continue to experience issues, feel free to contact SafeLine support for further assistance.

Top comments (1)

Collapse
 
peterparkerrbu profile image
peterparkerrbu

The community creations are mind-blowing; it's amazing to see what other players are building in Melon Sandbox.