CVE-2025-14204

6.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary operating system commands on systems running TykoDev cherry-studio-TykoFork 0.1. Attackers can exploit the OAuth Server Discovery component by manipulating the authorizationUrl parameter, leading to command injection. Any system running this specific version with the vulnerable component exposed is affected.

💻 Affected Systems

Products:
  • TykoDev cherry-studio-TykoFork
Versions: 0.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects version 0.1 of this specific fork. Requires the OAuth Server Discovery component to be enabled and accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands, install malware, exfiltrate data, or pivot to other systems.

🟠

Likely Case

Remote code execution leading to data theft, service disruption, or installation of backdoors.

🟢

If Mitigated

Limited impact if proper input validation and command execution restrictions are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details have been publicly disclosed. Remote exploitation without authentication is possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or applying workarounds.

🔧 Temporary Workarounds

Disable OAuth Server Discovery

all

Disable the vulnerable OAuth Server Discovery component to prevent exploitation.

Modify configuration to disable /.well-known/oauth-authorization-server endpoint

Input Validation Filter

all

Implement strict input validation on the authorizationUrl parameter to block command injection attempts.

Add input sanitization in redirectToAuthorization function to reject suspicious characters

🧯 If You Can't Patch

  • Implement network segmentation to isolate affected systems
  • Deploy web application firewall with command injection rules

🔍 How to Verify

Check if Vulnerable:

Check if running TykoDev cherry-studio-TykoFork version 0.1 and if /.well-known/oauth-authorization-server endpoint is accessible.

Check Version:

Check package.json or application metadata for version information

Verify Fix Applied:

Verify the OAuth Server Discovery component is disabled or input validation is properly implemented.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns
  • Access to /.well-known/oauth-authorization-server with suspicious parameters

Network Indicators:

  • HTTP requests to /.well-known/oauth-authorization-server with shell metacharacters in parameters

SIEM Query:

source="web_server" AND uri="/.well-known/oauth-authorization-server" AND (param="authorizationUrl" AND value MATCHES "[;&|`$()]+")

🔗 References

📤 Share & Export