Description

Dive is an open-source MCP Host Desktop Application that enables integration with function-calling LLMs. In versions 0.9.0 through 0.9.3, there is a one-click Remote Code Execution vulnerability triggered through a custom url value, `transport` in the JSON object. An attacker can exploit the vulnerability in the following two scenarios: a victim visits a malicious website controlled by the attacker and the website redirect to the URL automatically, or a victim clicks on such a crafted link embedded on a legitimate website (e.g., in user-generated content). In both cases, the browser invokes Dive's custom URL handler (dive:), which launches the Dive app and processes the crafted URL, leading to arbitrary code execution on the victim’s machine. This vulnerability is caused by improper processing of custom url. This is fixed in version 0.9.4.

INFO

Published Date :

2025-09-03T03:52:56.545Z

Last Modified :

2025-09-03T15:44:22.816Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2025-58176 vulnerability.

Vendors Products
Openagentplatform
  • Dive
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-58176.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact