DeepChat is a smart assistant that connects powerful AI to your personal world. DeepChat before 0.3.1 has a one-click remote code execution vulnerability. An attacker can exploit this vulnerability by embedding a specially crafted deepchat: URL on any website, including a malicious one they control. When a victim visits such a site or clicks on the link, the browser triggers the app’s custom URL handler (deepchat:), causing the DeepChat application to launch and process the URL, leading to remote code execution on the victim’s machine. This vulnerability is fixed in 0.3.1.
References
Configurations
No configuration.
History
20 Aug 2025, 14:40
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 Aug 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ThinkInAIXYZ/deepchat/security/advisories/GHSA-hqr4-4gfc-5p2j - |
19 Aug 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-19 19:15
Updated : 2025-08-20 14:40
NVD link : CVE-2025-55733
Mitre link : CVE-2025-55733
CVE.ORG link : CVE-2025-55733
JSON object : View
Products Affected
No product.
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')