Skip to main content

CVE-2025-58176: CWE-94: Improper Control of Generation of Code ('Code Injection') in OpenAgentPlatform Dive

High
VulnerabilityCVE-2025-58176cvecve-2025-58176cwe-94
Published: Wed Sep 03 2025 (09/03/2025, 03:52:56 UTC)
Source: CVE Database V5
Vendor/Project: OpenAgentPlatform
Product: Dive

Description

Dive is an open-source MCP Host Desktop Application that enables integration with function-calling LLMs. In versions 0.9.0 through 0.9.3, there is a one-click Remote Code Execution vulnerability triggered through a custom url value, `transport` in the JSON object. An attacker can exploit the vulnerability in the following two scenarios: a victim visits a malicious website controlled by the attacker and the website redirect to the URL automatically, or a victim clicks on such a crafted link embedded on a legitimate website (e.g., in user-generated content). In both cases, the browser invokes Dive's custom URL handler (dive:), which launches the Dive app and processes the crafted URL, leading to arbitrary code execution on the victim’s machine. This vulnerability is caused by improper processing of custom url. This is fixed in version 0.9.4.

AI-Powered Analysis

AILast updated: 09/03/2025, 04:17:47 UTC

Technical Analysis

CVE-2025-58176 is a critical remote code execution (RCE) vulnerability affecting the Dive application, an open-source MCP Host Desktop Application developed by OpenAgentPlatform that integrates with function-calling large language models (LLMs). The vulnerability exists in versions 0.9.0 through 0.9.3 and stems from improper handling of a custom URL scheme (dive:) used by the application. Specifically, the vulnerability is triggered via a crafted JSON object containing a malicious 'transport' parameter within the custom URL. When a user either visits a malicious website that automatically redirects to such a crafted dive: URL or clicks a maliciously crafted link embedded in legitimate content, the browser invokes Dive's custom URL handler. This handler processes the URL without adequate validation or sanitization, leading to arbitrary code execution on the victim’s machine. The root cause is categorized under CWE-94, indicating improper control over code generation, which allows an attacker to inject and execute arbitrary code remotely. The vulnerability requires no prior authentication but does require user interaction in the form of visiting or clicking a malicious link. The CVSS v3.1 base score is 8.8 (high severity), reflecting the network attack vector, low attack complexity, no privileges required, but user interaction needed, and high impact on confidentiality, integrity, and availability. The vulnerability has been fixed in Dive version 0.9.4. No known exploits have been reported in the wild as of the publication date (September 3, 2025).

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the potential for remote code execution on endpoints running vulnerable versions of Dive. Successful exploitation could lead to full system compromise, allowing attackers to steal sensitive data, manipulate or destroy information, and disrupt operations. Given Dive’s role in integrating with function-calling LLMs, attackers might also leverage this access to manipulate AI-driven workflows or exfiltrate intellectual property. The attack vector via web browsers increases the likelihood of exploitation through phishing campaigns or malicious websites, which are common attack methods in Europe. Organizations relying on Dive for AI integration in sectors such as finance, healthcare, or critical infrastructure could face severe operational and reputational damage. Additionally, the high confidentiality impact could lead to violations of GDPR and other data protection regulations, resulting in legal and financial penalties.

Mitigation Recommendations

European organizations should immediately verify if Dive is deployed within their environment and identify the version in use. Upgrading to Dive version 0.9.4 or later is the primary and most effective mitigation. Until the upgrade is applied, organizations should implement strict URL filtering and web content filtering to block dive: custom URL schemes from untrusted sources. Endpoint protection solutions should be configured to detect and block suspicious process launches initiated via custom URL handlers. User awareness training should emphasize the risks of clicking unknown or suspicious links, especially those that might invoke custom protocols. Network-level controls can be employed to restrict outbound connections from Dive processes to only trusted destinations. Additionally, organizations should monitor logs for unusual Dive application activity or unexpected process executions. If possible, disabling the custom URL handler for Dive temporarily can reduce exposure. Finally, coordinate with software vendors and security teams to ensure timely patch management and incident response readiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-27T13:34:56.189Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b7bde8ad5a09ad00ec5b69

Added to database: 9/3/2025, 4:02:48 AM

Last enriched: 9/3/2025, 4:17:47 AM

Last updated: 9/3/2025, 11:08:11 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats