Dive is an open-source MCP Host Desktop Application that enables integration with function-calling LLMs. In versions 0.9.0 through 0.9.3, there is a one-click Remote Code Execution vulnerability triggered through a custom url value, `transport` in the JSON object. An attacker can exploit the vulnerability in the following two scenarios: a victim visits a malicious website controlled by the attacker and the website redirect to the URL automatically, or a victim clicks on such a crafted link embedded on a legitimate website (e.g., in user-generated content). In both cases, the browser invokes Dive's custom URL handler (dive:), which launches the Dive app and processes the crafted URL, leading to arbitrary code execution on the victim’s machine. This vulnerability is caused by improper processing of custom url. This is fixed in version 0.9.4.
                
            Metrics
Affected Vendors & Products
References
        History
                    Thu, 11 Sep 2025 21:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Openagentplatform Openagentplatform dive | |
| CPEs | cpe:2.3:a:openagentplatform:dive:*:*:*:*:*:*:*:* | |
| Vendors & Products | Openagentplatform Openagentplatform dive | 
Wed, 03 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Wed, 03 Sep 2025 04:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Dive is an open-source MCP Host Desktop Application that enables integration with function-calling LLMs. In versions 0.9.0 through 0.9.3, there is a one-click Remote Code Execution vulnerability triggered through a custom url value, `transport` in the JSON object. An attacker can exploit the vulnerability in the following two scenarios: a victim visits a malicious website controlled by the attacker and the website redirect to the URL automatically, or a victim clicks on such a crafted link embedded on a legitimate website (e.g., in user-generated content). In both cases, the browser invokes Dive's custom URL handler (dive:), which launches the Dive app and processes the crafted URL, leading to arbitrary code execution on the victim’s machine. This vulnerability is caused by improper processing of custom url. This is fixed in version 0.9.4. | |
| Title | Dive's improper processing of custom urls can lead to Remote Code Execution | |
| Weaknesses | CWE-94 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-09-03T03:52:56.545Z
Updated: 2025-09-03T15:44:22.816Z
Reserved: 2025-08-27T13:34:56.189Z
Link: CVE-2025-58176
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-09-03T13:46:50.331Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2025-09-03T04:16:02.413
Modified: 2025-09-11T21:20:57.600
Link: CVE-2025-58176
 Redhat
                        Redhat
                    No data.