Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58766: CWE-94: Improper Control of Generation of Code ('Code Injection') in dyad-sh dyad

0
Critical
VulnerabilityCVE-2025-58766cvecve-2025-58766cwe-94
Published: Wed Sep 17 2025 (09/17/2025, 17:36:22 UTC)
Source: CVE Database V5
Vendor/Project: dyad-sh
Product: dyad

Description

Dyad is a local AI app builder. A critical security vulnerability has been discovered that affected Dyad v0.19.0 and earlier versions that allows attackers to execute arbitrary code on users' systems. The vulnerability affects the application's preview window functionality and can bypass Docker container protections. An attacker can craft web content that automatically executes when the preview loads. The malicious content can break out of the application's security boundaries and gain control of the system. This has been fixed in Dyad v0.20.0 and later.

AI-Powered Analysis

AILast updated: 09/17/2025, 17:42:27 UTC

Technical Analysis

CVE-2025-58766 is a critical code injection vulnerability (CWE-94) affecting Dyad, a local AI application builder, specifically versions prior to 0.20.0. The vulnerability resides in the application's preview window functionality, which processes web content. An attacker can craft malicious web content that executes automatically when loaded in the preview window. This malicious content can bypass Docker container protections, which are typically used to isolate and sandbox the application environment. By exploiting this flaw, an attacker can break out of the security boundaries established by Dyad and gain arbitrary code execution on the host system. This means the attacker can run any code with the privileges of the user running Dyad, potentially leading to full system compromise. The vulnerability requires at least limited privileges (PR:L) and user interaction (UI:R), as the user must load the malicious preview content. The CVSS 3.1 score is 9.1 (critical), reflecting the high impact on confidentiality, integrity, and availability, combined with network attack vector and low attack complexity. Although no known exploits are currently reported in the wild, the severity and nature of the vulnerability make it a significant threat, especially in environments where Dyad is used to build or test AI applications locally. The issue has been addressed in Dyad version 0.20.0 and later, so upgrading is essential to mitigate the risk.

Potential Impact

For European organizations, this vulnerability poses a severe risk, particularly for companies involved in AI development, software prototyping, or any workflows that incorporate Dyad. Successful exploitation could lead to unauthorized access to sensitive data, intellectual property theft, or disruption of critical AI development processes. Since the vulnerability allows code execution outside of containerized environments, it undermines common security practices relying on container isolation. This could facilitate lateral movement within networks, data exfiltration, or deployment of ransomware or other malware. Organizations with development teams using Dyad on endpoints connected to corporate networks are at risk of initial compromise spreading internally. The critical severity and ease of exploitation through user interaction mean that phishing or social engineering could be leveraged to trick users into loading malicious previews. This elevates the threat to a broader range of organizations beyond just those with advanced security postures. The impact on confidentiality, integrity, and availability is high, potentially affecting regulatory compliance (e.g., GDPR) if personal or sensitive data is exposed or systems are disrupted.

Mitigation Recommendations

1. Immediate upgrade to Dyad version 0.20.0 or later to apply the official patch that fixes the vulnerability. 2. Restrict usage of Dyad to trusted users and environments, especially avoiding loading untrusted or external preview content. 3. Implement endpoint protection solutions that monitor and block suspicious code execution behaviors, particularly those attempting to escape container boundaries. 4. Enforce strict network segmentation and least privilege principles for users running Dyad to limit potential lateral movement in case of compromise. 5. Educate users about the risks of loading unverified content in development tools and incorporate security awareness training focused on social engineering tactics. 6. Use application whitelisting and sandboxing technologies to further isolate Dyad processes and prevent unauthorized code execution. 7. Monitor logs and system behavior for indicators of compromise related to Dyad usage, such as unexpected process launches or network connections. 8. If Docker containers are used, review and harden container configurations to reduce the risk of breakout, including limiting container privileges and capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-04T19:18:09.500Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68caf2f2822eeeec0bbb2583

Added to database: 9/17/2025, 5:42:10 PM

Last enriched: 9/17/2025, 5:42:27 PM

Last updated: 11/2/2025, 4:58:36 AM

Views: 126

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats