Custom Protocol Vulnerability in Cherry Studio Desktop Client
CVE-2025-61929

9.7CRITICAL

Key Information:

Vendor

Cherryhq

Vendor
CVE Published:
10 October 2025

What is CVE-2025-61929?

Cherry Studio, a desktop client for multiple LLM providers, contains a vulnerability that allows an attacker to exploit the custom protocol cherrystudio://. This occurs when the software processes MCP installation URLs, leading to the execution of arbitrary commands derived from base64-encoded data. An attacker could create a malicious link that appears legitimate. When a user clicks it, the malicious command executes against the user's setup. Currently, no patched versions have been released, leaving users exposed to potential exploits. To protect your system, exercise caution when interacting with URLs associated with Cherry Studio and stay updated on advisories.

Affected Version(s)

cherry-studio <= 1.7.0-alpha.4

References

CVSS V3.1

Score:
9.7
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-61929 : Custom Protocol Vulnerability in Cherry Studio Desktop Client