DeepChat is a smart assistant that connects powerful AI to your personal world. DeepChat before 0.3.1 has a one-click remote code execution vulnerability. An attacker can exploit this vulnerability by embedding a specially crafted deepchat: URL on any website, including a malicious one they control. When a victim visits such a site or clicks on the link, the browser triggers the app’s custom URL handler (deepchat:), causing the DeepChat application to launch and process the URL, leading to remote code execution on the victim’s machine. This vulnerability is fixed in 0.3.1.
References
Link | Resource |
---|---|
https://github.com/ThinkInAIXYZ/deepchat/commit/a0ff6f362e01ddceb7fd42d0af0b28b6184fb4d2 | Patch |
https://github.com/ThinkInAIXYZ/deepchat/security/advisories/GHSA-hqr4-4gfc-5p2j | Exploit Vendor Advisory |
https://github.com/ThinkInAIXYZ/deepchat/security/advisories/GHSA-hqr4-4gfc-5p2j | Exploit Vendor Advisory |
Configurations
History
17 Sep 2025, 17:58
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:thinkinai:deepchat:0.3.0:*:*:*:*:*:*:* | |
First Time |
Thinkinai
Thinkinai deepchat |
|
References | () https://github.com/ThinkInAIXYZ/deepchat/commit/a0ff6f362e01ddceb7fd42d0af0b28b6184fb4d2 - Patch | |
References | () https://github.com/ThinkInAIXYZ/deepchat/security/advisories/GHSA-hqr4-4gfc-5p2j - Exploit, Vendor Advisory |
20 Aug 2025, 14:40
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 Aug 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ThinkInAIXYZ/deepchat/security/advisories/GHSA-hqr4-4gfc-5p2j - |
19 Aug 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-19 19:15
Updated : 2025-09-17 17:58
NVD link : CVE-2025-55733
Mitre link : CVE-2025-55733
CVE.ORG link : CVE-2025-55733
JSON object : View
Products Affected
thinkinai
- deepchat
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')