Vulnerability Description
Dive is an open-source MCP Host Desktop Application that enables integration with function-calling LLMs. In versions 0.9.0 through 0.9.3, there is a one-click Remote Code Execution vulnerability triggered through a custom url value, `transport` in the JSON object. An attacker can exploit the vulnerability in the following two scenarios: a victim visits a malicious website controlled by the attacker and the website redirect to the URL automatically, or a victim clicks on such a crafted link embedded on a legitimate website (e.g., in user-generated content). In both cases, the browser invokes Dive's custom URL handler (dive:), which launches the Dive app and processes the crafted URL, leading to arbitrary code execution on the victim’s machine. This vulnerability is caused by improper processing of custom url. This is fixed in version 0.9.4.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openagentplatform | Dive | >= 0.9.0, < 0.9.4 |
Related Weaknesses (CWE)
References
- https://github.com/OpenAgentPlatform/Dive/commit/acae6d40354d380f69f8241e9122a43Patch
- https://github.com/OpenAgentPlatform/Dive/security/advisories/GHSA-2r34-7pgx-vvrExploitVendor Advisory
- https://github.com/OpenAgentPlatform/Dive/security/advisories/GHSA-2r34-7pgx-vvrExploitVendor Advisory
FAQ
What is CVE-2025-58176?
CVE-2025-58176 is a vulnerability with a CVSS score of 8.8 (HIGH). Dive is an open-source MCP Host Desktop Application that enables integration with function-calling LLMs. In versions 0.9.0 through 0.9.3, there is a one-click Remote Code Execution vulnerability trigg...
How severe is CVE-2025-58176?
CVE-2025-58176 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-58176?
Check the references section above for vendor advisories and patch information. Affected products include: Openagentplatform Dive.