CVE-2025-54074

9.8 CRITICAL

📋 TL;DR

Cherry Studio desktop client versions 1.2.5 to 1.5.1 are vulnerable to OS command injection when connecting to malicious MCP servers in HTTP Streamable mode. Attackers can trick users into connecting to specially crafted servers, allowing arbitrary command execution on the victim's system. This affects all users running vulnerable versions of Cherry Studio.

💻 Affected Systems

Products:
  • Cherry Studio
Versions: 1.2.5 to 1.5.1
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires user interaction to connect to malicious MCP server, but default configuration allows HTTP Streamable mode connections.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the victim's machine, data theft, ransomware deployment, or lateral movement within networks.

🟠

Likely Case

Local privilege escalation, data exfiltration, or installation of persistent malware on individual user workstations.

🟢

If Mitigated

Limited impact if network segmentation prevents connections to untrusted MCP servers and users only connect to known, trusted servers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user to connect to malicious server, but technical complexity is low once server is established.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.2

Vendor Advisory: https://github.com/CherryHQ/cherry-studio/security/advisories/GHSA-8xr5-732g-84px

Restart Required: Yes

Instructions:

1. Download Cherry Studio version 1.5.2 or later from official sources. 2. Install the update. 3. Restart Cherry Studio. 4. Verify version shows 1.5.2 or higher.

🔧 Temporary Workarounds

Disable HTTP Streamable Mode

all

Prevent connections to MCP servers using HTTP Streamable mode where possible.

Restrict MCP Server Connections

all

Configure firewall rules to only allow connections to trusted MCP servers.

🧯 If You Can't Patch

  • Implement network segmentation to restrict connections to untrusted MCP servers
  • Educate users to only connect to known, trusted MCP servers and avoid unknown sources

🔍 How to Verify

Check if Vulnerable:

Check Cherry Studio version in application settings or About dialog. If version is between 1.2.5 and 1.5.1 inclusive, system is vulnerable.

Check Version:

Check application settings or run 'cherry-studio --version' if available via command line.

Verify Fix Applied:

Verify Cherry Studio version shows 1.5.2 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process spawns from Cherry Studio
  • Network connections to unknown MCP servers
  • Command execution patterns from Cherry Studio process

Network Indicators:

  • Outbound connections to non-standard MCP servers on unusual ports
  • HTTP traffic to unknown domains during MCP server connections

SIEM Query:

process_name:"cherry-studio" AND (process_command_line:*cmd* OR process_command_line:*powershell* OR process_command_line:*bash*)

🔗 References

📤 Share & Export