Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
DeepChat: Incomplete Fix for CVE-2025-55733 leads to Remote Code Execution via Markdown Links bypassing `isValidExternalUrl`
Vulnerability Description
DeepChat is an open-source artificial intelligence agent platform that unifies models, tools, and agents. Prior to v1.0.4-beta.1, An incomplete mitigation for CVE-2025-55733 leaves DeepChat vulnerable to an arbitrary protocol execution bypass (RCE). While the patch correctly restricted api.openExternal() inside the renderer's preload/index.ts script, it structurally neglected to sanitize native Electron pop-up window handlers. An attacker or a compromised AI endpoint returning a Markdown link can trigger a target="_blank" native window interception in tabPresenter.ts, which forwards the malicious URL directly to shell.openExternal(url) and completely bypasses the isValidExternalUrl security boundary. This vulnerability is fixed in v1.0.4-beta.1.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Vulnerability Type
输入验证不恰当
Vulnerability Title
DeepChat 输入验证错误漏洞
Vulnerability Description
DeepChat是ThinkInAIXYZ开源的一款智能助手。 DeepChat v1.0.4-beta.1之前版本存在输入验证错误漏洞,该漏洞源于对CVE-2025-55733的不完全缓解措施,虽然补丁正确限制了渲染器中的api.openExternal(),但结构上忽略了清理原生Electron弹出窗口处理程序,攻击者或受损AI端点返回的Markdown链接可触发target=_blank原生窗口拦截,将恶意URL直接转发给shell.openExternal(url)并完全绕过isValidExte
CVSS Information
N/A
Vulnerability Type
N/A