Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23523: CWE-94: Improper Control of Generation of Code ('Code Injection') in OpenAgentPlatform Dive

0
Critical
VulnerabilityCVE-2026-23523cvecve-2026-23523cwe-94
Published: Fri Jan 16 2026 (01/16/2026, 16:29:48 UTC)
Source: CVE Database V5
Vendor/Project: OpenAgentPlatform
Product: Dive

Description

Dive is an open-source MCP Host Desktop Application that enables integration with function-calling LLMs. Prior to 0.13.0, crafted deeplink can install an attacker-controlled MCP server configuration without sufficient user confirmation and can lead to arbitrary local command execution on the victim’s machine. This vulnerability is fixed in 0.13.0.

AI-Powered Analysis

AILast updated: 01/16/2026, 17:06:05 UTC

Technical Analysis

CVE-2026-23523 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code) affecting the OpenAgentPlatform Dive application, an open-source MCP Host Desktop Application designed for integration with function-calling large language models (LLMs). The vulnerability exists in versions prior to 0.13.0 and arises from insufficient validation and user confirmation when processing crafted deeplinks. An attacker can create a malicious deeplink that, when activated by a user, installs an attacker-controlled MCP server configuration on the victim's machine. This leads to arbitrary local command execution, allowing the attacker to execute code with the privileges of the user running Dive. The vulnerability is remotely exploitable without requiring prior authentication (AV:N), has low attack complexity (AC:L), and requires user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), as arbitrary code execution can lead to data theft, system compromise, or denial of service. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make it a critical threat. The issue is resolved in Dive version 0.13.0, which includes proper user confirmation and validation mechanisms to prevent unauthorized MCP server configuration installation.

Potential Impact

For European organizations, the impact of this vulnerability is significant, especially for those leveraging Dive for integrating function-calling LLMs in their workflows. Successful exploitation can lead to full system compromise of affected endpoints, resulting in potential data breaches, unauthorized access to sensitive information, disruption of business operations, and lateral movement within networks. Organizations in sectors such as finance, healthcare, and critical infrastructure that rely on AI integration tools are particularly vulnerable. The ability to execute arbitrary commands locally can facilitate deployment of ransomware, espionage tools, or persistent backdoors. Given the remote exploitability with only user interaction required, phishing or social engineering campaigns could be used to trigger the vulnerability, increasing the attack surface. The critical CVSS score reflects the high risk posed to confidentiality, integrity, and availability of affected systems.

Mitigation Recommendations

1. Immediate upgrade to OpenAgentPlatform Dive version 0.13.0 or later to ensure the vulnerability is patched. 2. Implement strict controls on deeplink handling by configuring the application or endpoint security solutions to only accept deeplinks from trusted and verified sources. 3. Educate users on the risks of clicking unsolicited or suspicious deeplinks, especially those received via email or messaging platforms. 4. Employ endpoint detection and response (EDR) tools to monitor for unusual command execution patterns indicative of exploitation attempts. 5. Use application whitelisting to restrict execution of unauthorized processes spawned by Dive or related components. 6. Regularly audit and monitor MCP server configurations for unauthorized changes. 7. Integrate multi-factor authentication and least privilege principles to limit the impact of any local compromise. 8. Establish incident response procedures specifically addressing potential exploitation of code injection vulnerabilities in AI integration tools.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-13T18:22:43.980Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696a6c98b22c7ad868bf5936

Added to database: 1/16/2026, 4:51:36 PM

Last enriched: 1/16/2026, 5:06:05 PM

Last updated: 1/16/2026, 5:54:11 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats