CVE-2026-43899

DeepChat · DeepChat AI Platform

DeepChat contains an arbitrary protocol execution bypass allowing Remote Code Execution (RCE) via improper handling of native Electron pop-up windows.

Executive summary

A critical RCE vulnerability in DeepChat allows an attacker to execute arbitrary code via a malicious Markdown link that bypasses the platform’s security boundaries.

Vulnerability

This is an arbitrary protocol execution vulnerability stemming from the failure to sanitize native Electron pop-up window handlers. An unauthenticated attacker can trigger a shell.openExternal() call via a malformed Markdown link, leading to potential RCE.

Business impact

This vulnerability allows for full system compromise, providing attackers with the ability to execute arbitrary commands on the host machine. With a CVSS score of 9.6, this is a critical threat that could lead to complete data exfiltration and loss of control over the affected system.

Remediation

Immediate Action: Upgrade to DeepChat version 1.0.4-beta.1 or later to apply the necessary security boundary fixes.

Proactive Monitoring: Review system logs for unusual external process execution and monitor for unexpected spawned child processes originating from the application.

Compensating Controls: Restrict the application’s ability to spawn external processes or open external URLs using OS-level sandboxing or egress filtering.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The severity of this RCE vulnerability necessitates immediate remediation. Administrators should ensure that all instances of the DeepChat platform are updated to the patched version to prevent remote code execution attacks.