CVE-2025-58176: CWE-94: Improper Control of Generation of Code ('Code Injection') in OpenAgentPlatform Dive
Dive is an open-source MCP Host Desktop Application that enables integration with function-calling LLMs. In versions 0.9.0 through 0.9.3, there is a one-click Remote Code Execution vulnerability triggered through a custom url value, `transport` in the JSON object. An attacker can exploit the vulnerability in the following two scenarios: a victim visits a malicious website controlled by the attacker and the website redirect to the URL automatically, or a victim clicks on such a crafted link embedded on a legitimate website (e.g., in user-generated content). In both cases, the browser invokes Dive's custom URL handler (dive:), which launches the Dive app and processes the crafted URL, leading to arbitrary code execution on the victim’s machine. This vulnerability is caused by improper processing of custom url. This is fixed in version 0.9.4.
AI Analysis
Technical Summary
CVE-2025-58176 is a critical remote code execution (RCE) vulnerability affecting versions 0.9.0 through 0.9.3 of Dive, an open-source MCP Host Desktop Application developed by OpenAgentPlatform. Dive integrates with function-calling large language models (LLMs) and registers a custom URL scheme handler (dive:) on the victim’s machine. The vulnerability arises from improper validation and processing of the 'transport' parameter within a JSON object embedded in the custom URL. When a user either visits a malicious website that automatically redirects to a crafted dive: URL or clicks on a maliciously crafted link embedded in legitimate content, the browser invokes Dive’s custom URL handler. This causes Dive to parse and execute the supplied data without adequate sanitization, leading to arbitrary code execution on the victim’s system. The vulnerability is classified under CWE-94 (Improper Control of Generation of Code), indicating that untrusted input is directly used to generate and execute code. The CVSS v3.1 base score is 8.8 (high severity), with attack vector being network (AV:N), no privileges required (PR:N), user interaction required (UI:R), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the ease of exploitation via a single click or automatic redirect makes this a significant threat. The issue is resolved in Dive version 0.9.4, which properly sanitizes and validates the custom URL input before processing.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those using Dive as part of their LLM integration workflows or desktop automation. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary commands, steal sensitive data, manipulate or destroy files, and potentially move laterally within corporate networks. Given the high confidentiality, integrity, and availability impacts, critical business operations could be disrupted. The attack vector involving user interaction or automatic redirects makes phishing campaigns or malicious web content effective delivery methods. Organizations in sectors with high reliance on AI/LLM tools or desktop integrations—such as technology firms, research institutions, and financial services—are particularly vulnerable. Additionally, since Dive is open-source and may be integrated into customized environments, unpatched instances might be widespread, increasing the attack surface. The lack of known exploits in the wild currently provides a window for proactive patching and mitigation before widespread exploitation occurs.
Mitigation Recommendations
1. Immediate upgrade to Dive version 0.9.4 or later, which contains the fix for this vulnerability. 2. Implement strict URL filtering and validation at the network perimeter to block or flag dive: custom URL schemes originating from untrusted or external sources. 3. Educate users about the risks of clicking on unknown or suspicious links, especially those that may trigger application launches via custom URL handlers. 4. Employ endpoint protection solutions capable of detecting anomalous process launches or suspicious command executions initiated by Dive or related processes. 5. For organizations deploying Dive in managed environments, consider disabling or restricting the registration of custom URL handlers unless absolutely necessary. 6. Monitor logs and network traffic for unusual activity related to Dive or unexpected invocations of the custom URL scheme. 7. Conduct internal audits to identify all instances of Dive deployment and ensure timely patching. 8. Use application whitelisting to prevent unauthorized execution of code spawned by Dive.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Ireland, Switzerland
CVE-2025-58176: CWE-94: Improper Control of Generation of Code ('Code Injection') in OpenAgentPlatform Dive
Description
Dive is an open-source MCP Host Desktop Application that enables integration with function-calling LLMs. In versions 0.9.0 through 0.9.3, there is a one-click Remote Code Execution vulnerability triggered through a custom url value, `transport` in the JSON object. An attacker can exploit the vulnerability in the following two scenarios: a victim visits a malicious website controlled by the attacker and the website redirect to the URL automatically, or a victim clicks on such a crafted link embedded on a legitimate website (e.g., in user-generated content). In both cases, the browser invokes Dive's custom URL handler (dive:), which launches the Dive app and processes the crafted URL, leading to arbitrary code execution on the victim’s machine. This vulnerability is caused by improper processing of custom url. This is fixed in version 0.9.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-58176 is a critical remote code execution (RCE) vulnerability affecting versions 0.9.0 through 0.9.3 of Dive, an open-source MCP Host Desktop Application developed by OpenAgentPlatform. Dive integrates with function-calling large language models (LLMs) and registers a custom URL scheme handler (dive:) on the victim’s machine. The vulnerability arises from improper validation and processing of the 'transport' parameter within a JSON object embedded in the custom URL. When a user either visits a malicious website that automatically redirects to a crafted dive: URL or clicks on a maliciously crafted link embedded in legitimate content, the browser invokes Dive’s custom URL handler. This causes Dive to parse and execute the supplied data without adequate sanitization, leading to arbitrary code execution on the victim’s system. The vulnerability is classified under CWE-94 (Improper Control of Generation of Code), indicating that untrusted input is directly used to generate and execute code. The CVSS v3.1 base score is 8.8 (high severity), with attack vector being network (AV:N), no privileges required (PR:N), user interaction required (UI:R), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the ease of exploitation via a single click or automatic redirect makes this a significant threat. The issue is resolved in Dive version 0.9.4, which properly sanitizes and validates the custom URL input before processing.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those using Dive as part of their LLM integration workflows or desktop automation. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary commands, steal sensitive data, manipulate or destroy files, and potentially move laterally within corporate networks. Given the high confidentiality, integrity, and availability impacts, critical business operations could be disrupted. The attack vector involving user interaction or automatic redirects makes phishing campaigns or malicious web content effective delivery methods. Organizations in sectors with high reliance on AI/LLM tools or desktop integrations—such as technology firms, research institutions, and financial services—are particularly vulnerable. Additionally, since Dive is open-source and may be integrated into customized environments, unpatched instances might be widespread, increasing the attack surface. The lack of known exploits in the wild currently provides a window for proactive patching and mitigation before widespread exploitation occurs.
Mitigation Recommendations
1. Immediate upgrade to Dive version 0.9.4 or later, which contains the fix for this vulnerability. 2. Implement strict URL filtering and validation at the network perimeter to block or flag dive: custom URL schemes originating from untrusted or external sources. 3. Educate users about the risks of clicking on unknown or suspicious links, especially those that may trigger application launches via custom URL handlers. 4. Employ endpoint protection solutions capable of detecting anomalous process launches or suspicious command executions initiated by Dive or related processes. 5. For organizations deploying Dive in managed environments, consider disabling or restricting the registration of custom URL handlers unless absolutely necessary. 6. Monitor logs and network traffic for unusual activity related to Dive or unexpected invocations of the custom URL scheme. 7. Conduct internal audits to identify all instances of Dive deployment and ensure timely patching. 8. Use application whitelisting to prevent unauthorized execution of code spawned by Dive.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-27T13:34:56.189Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68b7bde8ad5a09ad00ec5b69
Added to database: 9/3/2025, 4:02:48 AM
Last enriched: 9/10/2025, 4:51:12 AM
Last updated: 10/18/2025, 10:02:45 AM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11926: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdreams Related Posts Lite
MediumCVE-2025-9890: CWE-352 Cross-Site Request Forgery (CSRF) in mndpsingh287 Theme Editor
HighCVE-2025-5555: Stack-based Buffer Overflow in Nixdorf Wincor PORT IO Driver
HighCVE-2025-11256: CWE-285 Improper Authorization in kognetiks Kognetiks Chatbot
MediumCVE-2025-10750: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in cyberlord92 PowerBI Embed Reports
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.