{"id":64101,"date":"2025-08-16T17:33:43","date_gmt":"2025-08-16T17:33:43","guid":{"rendered":""},"modified":"2025-10-03T12:33:01","modified_gmt":"2025-10-03T18:33:01","slug":"cve-2025-54063-remote-code-execution-vulnerability-in-cherry-studio-desktop-client","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-54063-remote-code-execution-vulnerability-in-cherry-studio-desktop-client\/","title":{"rendered":"<strong>CVE-2025-54063: Remote Code Execution Vulnerability in Cherry Studio Desktop Client<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>In this blog post, we will delve deep into a critical vulnerability found in Cherry Studio, a popular desktop client used by multiple LLM providers. The vulnerability, known as CVE-2025-54063, is a high-severity issue that could potentially lead to remote code execution on a victim&#8217;s machine. This <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-20217-denial-of-service-vulnerability-in-snort-3-detection-engine-of-cisco-secure-firewall-threat-defense-software\/\"  data-wpil-monitor-id=\"76977\">vulnerability is significant because it poses a threat<\/a> to the confidentiality, integrity, and availability of information. It affects Cherry Studio versions 1.4.8 to 1.5.0, and if exploited, could <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-27050-memory-corruption-vulnerability-leading-to-potential-system-compromise-and-data-leakage\/\"  data-wpil-monitor-id=\"74937\">lead to system compromise or data<\/a> leakage.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-54063<br \/>\nSeverity: High, CVSS score 8.0<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: Required<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-50754-stored-cross-site-scripting-xss-vulnerability-leading-to-remote-code-execution-in-unisite-cms-5-0\/\"  data-wpil-monitor-id=\"74591\">Remote code execution<\/a>, potential system compromise or data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-676524723\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>Cherry Studio Desktop Client | 1.4.8 to 1.5.0<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The CVE-2025-54063 vulnerability is a one-click <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-43193-critical-memory-handling-vulnerability-in-macos\/\"  data-wpil-monitor-id=\"71704\">remote code execution<\/a> flaw existing in the custom URL handling of Cherry Studio. An attacker can exploit this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-8714-critical-postgresql-vulnerability-allowing-malicious-code-injection-by-superusers\/\"  data-wpil-monitor-id=\"80656\">vulnerability by creating a malicious<\/a> website or embedding a specially crafted URL on any website. When a user clicks on this malicious link in a browser, the Cherry Studio&#8217;s custom URL handler is triggered, which leads to the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-49746-improper-authorization-in-azure-machine-learning-leading-to-privilege-escalation\/\"  data-wpil-monitor-id=\"73304\">execution of remote code<\/a> on the victim&#8217;s machine. This can <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-40741-stack-based-overflow-vulnerability-in-solid-edge-se2025-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"75785\">lead to system<\/a> compromise or data leakage, depending on the code executed and the privileges it leverages.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-2712648622\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Assume that an attacker has created a specially crafted URL that contains the malicious payload. This URL could look something like the following:<\/p>\n<pre><code class=\"\" data-line=\"\">GET http:\/\/malicious.example.com\/exploit?payload=base64_encoded_malicious_code HTTP\/1.1<\/code><\/pre>\n<p>When a victim unknowingly clicks this link, the browser would send a GET request to the malicious server, triggering the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-27577-arbitrary-code-execution-in-openharmony-via-race-condition-vulnerability\/\"  data-wpil-monitor-id=\"76219\">execution of the malicious code on the victim&#8217;s machine via<\/a> the Cherry Studio&#8217;s custom URL handler.<\/p>\n<p><strong>Mitigation Guidance<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-43588-out-of-bounds-write-vulnerability-in-substance3d-sampler-versions-5-0-and-earlier\/\"  data-wpil-monitor-id=\"73500\">vulnerability has been patched in Cherry Studio version<\/a> 1.5.1. Therefore, the primary mitigation step is to update Cherry Studio to the latest version. If updating is not immediately possible, users can employ a Web Application Firewall (WAF) or Intrusion Detection System (IDS) as a temporary mitigation measure to detect and block any malicious traffic. However, these should only be considered as temporary measures, and updating to the patched version should be done as soon as possible to ensure maximum security.<br \/>\nAlways remember, staying updated is one of the best defenses against <a href=\"https:\/\/www.ameeba.com\/blog\/introducing-the-ameeba-cybersecurity-group-chat\/\"  data-wpil-monitor-id=\"88494\">cybersecurity<\/a> threats. Stay vigilant, stay updated, and keep your <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-46916-critical-vulnerability-in-diebold-nixdorf-vynamic-security-suite-allows-system-compromise\/\"  data-wpil-monitor-id=\"88495\">systems secure<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview In this blog post, we will delve deep into a critical vulnerability found in Cherry Studio, a popular desktop client used by multiple LLM providers. The vulnerability, known as CVE-2025-54063, is a high-severity issue that could potentially lead to remote code execution on a victim&#8217;s machine. This vulnerability is significant because it poses a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[80],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-64101","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-rce"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/64101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=64101"}],"version-history":[{"count":10,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/64101\/revisions"}],"predecessor-version":[{"id":81301,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/64101\/revisions\/81301"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=64101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=64101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=64101"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=64101"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=64101"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=64101"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=64101"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=64101"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=64101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}