CVE-2025-67744
Published: 16 December 2025
Description
DeepChat is an open-source artificial intelligence agent platform that unifies models, tools, and agents. Prior to version 0.5.3, a security vulnerability exists in the Mermaid diagram rendering component that allows arbitrary JavaScript execution. Due to the exposure of the Electron…
more
IPC renderer to the DOM, this Cross-Site Scripting (XSS) flaw escalates to full Remote Code Execution (RCE), allowing an attacker to execute arbitrary system commands. Two concurrent issues, unsafe Mermaid configuration and an exposed IPC interface, cause this issue. Version 0.5.3 contains a patch.
Mitigating Controls (NIST 800-53 r5)AI
Enforces secure baseline configuration settings for the Mermaid diagram renderer to disable arbitrary JavaScript execution and for Electron IPC to prevent DOM exposure.
Provides process isolation between the untrusted renderer (DOM) and privileged Electron IPC interface, blocking XSS escalation to RCE.
Validates inputs to the Mermaid rendering component to reject malicious diagrams containing arbitrary JavaScript code injection.
Security SummaryAI
CVE-2025-67744 is a high-severity vulnerability (CVSS 9.6) affecting DeepChat, an open-source artificial intelligence agent platform that unifies models, tools, and agents, in versions prior to 0.5.3. The flaw resides in the Mermaid diagram rendering component, which permits arbitrary JavaScript execution due to unsafe Mermaid configuration. This XSS issue escalates to full remote code execution (RCE) because of an exposed Electron IPC renderer interface accessible from the DOM, enabling attackers to run arbitrary system commands. It is classified under CWE-94 (Code Injection).
An attacker can exploit this vulnerability over the network with low complexity and no privileges required, though user interaction is needed to render a malicious Mermaid diagram within DeepChat. Successful exploitation changes the scope and grants high confidentiality, integrity, and availability impact, culminating in arbitrary command execution on the victim's system.
The GitHub security advisory (GHSA-w8w8-82pv-5rg9) and patch commit (b179d97921af04a0ae1ae68757338dd8b8cbefe7) confirm that upgrading to DeepChat version 0.5.3 resolves the issues by addressing the unsafe Mermaid configuration and exposed IPC interface.
This vulnerability is particularly relevant to AI/ML practitioners using DeepChat for agent development, as it highlights risks in rendering untrusted diagram content within Electron-based desktop applications. No real-world exploitation has been reported as of the CVE publication on 2025-12-16.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- AI Agent Protocols and Integrations
- Risk Domain
- Other ATLAS/OWASP Terms
- OWASP Top 10 for LLMs 2025
- None mapped
- MITRE ATLAS Techniques
- None mapped
- Classification Reason
- DeepChat is explicitly described as an open-source artificial intelligence agent platform that unifies models, tools, and agents, fitting the AI Agent Protocols and Integrations category.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability enables arbitrary JavaScript execution via Mermaid diagram rendering in an Electron application, escalating XSS to full RCE through exposed IPC, directly facilitating Exploitation for Client Execution.