CVE-2026-43899: DeepChat RCE Via Incomplete Patch for External Protocol Execution
The National Vulnerability Database has detailed CVE-2026-43899, a critical remote code execution (RCE) vulnerability in DeepChat, an open-source AI agent platform. This flaw, present in versions prior to v1.0.4-beta.1, stems from an incomplete mitigation for a previous vulnerability, CVE-2025-55733.
While developers attempted to restrict api.openExternal() calls, the patch failed to sanitize native Electron pop-up window handlers. This oversight allows an attacker, or a compromised AI endpoint, to embed a malicious Markdown link. When a user interacts with this link, a target="_blank" native window interception in tabPresenter.ts forwards the malicious URL directly to shell.openExternal(url), completely bypassing the intended isValidExternalUrl security controls. The National Vulnerability Database assigned this a CVSS score of 9.6 (CRITICAL).
This is a classic example of security debt. An initial fix was deployed, but the underlying architectural weakness wasn’t fully addressed, leading to a bypass. Defenders using DeepChat must prioritize upgrading to v1.0.4-beta.1 immediately. Attackers will undoubtedly leverage this kind of vulnerability to gain initial access or escalate privileges within environments integrating AI agents, exploiting the trust placed in these platforms.
What This Means For You
- If your organization integrates DeepChat or similar AI agent platforms, you need to verify your version immediately. This isn't theoretical; it's an RCE bypass that allows arbitrary protocol execution. Patch to v1.0.4-beta.1 without delay and audit your AI endpoint configurations for any untrusted content sources. Assume compromise if you haven't patched.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-43899: DeepChat RCE via shell.openExternal() with malicious URL
title: CVE-2026-43899: DeepChat RCE via shell.openExternal() with malicious URL
id: scw-2026-05-11-ai-1
status: experimental
level: critical
description: |
Detects the execution of shell.openExternal() with a target="_blank" attribute and a javascript: URI, indicating an attempt to exploit CVE-2026-43899 in DeepChat. This bypasses the intended security checks by leveraging Electron's native window handling.
author: SCW Feed Engine (AI-generated)
date: 2026-05-11
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-43899/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: process_creation
detection:
selection:
Image|endswith:
- 'electron.exe'
CommandLine|contains:
- 'shell:openExternal'
CommandLine|contains:
- 'target="_blank"'
CommandLine|contains:
- 'javascript:'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-43899 | RCE | DeepChat < v1.0.4-beta.1 |
| CVE-2026-43899 | RCE | Incomplete mitigation for CVE-2025-55733 |
| CVE-2026-43899 | RCE | Electron pop-up window handlers in tabPresenter.ts |
| CVE-2026-43899 | RCE | Bypass of isValidExternalUrl security boundary via shell.openExternal(url) |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 12, 2026 at 02:20 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.