Cherry Studio is a desktop client that supports for multiple LLM providers. In version 1.5.1, a remote code execution (RCE) vulnerability exists in the Cherry Studio platform when connecting to streamableHttp MCP servers. The issue arises from the server’s implicit trust in the oauth auth redirection endpoints and failure to properly sanitize the URL. This issue has been patched in version 1.5.2.
References
| Link | Resource |
|---|---|
| https://github.com/CherryHQ/cherry-studio/security/advisories/GHSA-gjp6-9cvg-8w93 | Exploit Vendor Advisory |
Configurations
History
01 Dec 2025, 18:09
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Cherry-ai
Cherry-ai cherry Studio |
|
| References | () https://github.com/CherryHQ/cherry-studio/security/advisories/GHSA-gjp6-9cvg-8w93 - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:cherry-ai:cherry_studio:*:*:*:*:*:*:*:* |
Information
Published : 2025-08-13 14:15
Updated : 2025-12-01 18:09
NVD link : CVE-2025-54382
Mitre link : CVE-2025-54382
CVE.ORG link : CVE-2025-54382
JSON object : View
Products Affected
cherry-ai
- cherry_studio
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
