DeepChat is a smart assistant that connects powerful AI to your personal world. DeepChat before 0.3.1 has a one-click remote code execution vulnerability. An attacker can exploit this vulnerability by embedding a specially crafted deepchat: URL on any website, including a malicious one they control. When a victim visits such a site or clicks on the link, the browser triggers the app’s custom URL handler (deepchat:), causing the DeepChat application to launch and process the URL, leading to remote code execution on the victim’s machine. This vulnerability is fixed in 0.3.1.
References
| Link | Resource |
|---|---|
| https://github.com/ThinkInAIXYZ/deepchat/commit/a0ff6f362e01ddceb7fd42d0af0b28b6184fb4d2 | Patch |
| https://github.com/ThinkInAIXYZ/deepchat/security/advisories/GHSA-hqr4-4gfc-5p2j | Exploit Vendor Advisory |
| https://github.com/ThinkInAIXYZ/deepchat/security/advisories/GHSA-hqr4-4gfc-5p2j | Exploit Vendor Advisory |
Configurations
History
17 Sep 2025, 17:58
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:thinkinai:deepchat:0.3.0:*:*:*:*:*:*:* | |
| First Time |
Thinkinai
Thinkinai deepchat |
|
| References | () https://github.com/ThinkInAIXYZ/deepchat/commit/a0ff6f362e01ddceb7fd42d0af0b28b6184fb4d2 - Patch | |
| References | () https://github.com/ThinkInAIXYZ/deepchat/security/advisories/GHSA-hqr4-4gfc-5p2j - Exploit, Vendor Advisory |
20 Aug 2025, 14:40
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
19 Aug 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/ThinkInAIXYZ/deepchat/security/advisories/GHSA-hqr4-4gfc-5p2j - |
19 Aug 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-19 19:15
Updated : 2025-09-17 17:58
NVD link : CVE-2025-55733
Mitre link : CVE-2025-55733
CVE.ORG link : CVE-2025-55733
JSON object : View
Products Affected
thinkinai
- deepchat
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
