Remote Code Execution Vulnerability in Dive Application by OpenAgentPlatform
CVE-2025-58176

8.8HIGH

Key Information:

Status
Vendor
CVE Published:
3 September 2025

What is CVE-2025-58176?

Dive is an open-source MCP Host Desktop Application that allows integration with function-calling LLMs. Versions 0.9.0 through 0.9.3 have a remote code execution vulnerability resulting from improper handling of custom URL values. This flaw can be exploited by an attacker through two main scenarios: either by tricking a victim into visiting a malicious website that redirects the victim to a specially crafted URL or via a designed link on a legitimate site. When the custom URL handler, dive:, is invoked by the user's browser, it launches the Dive app and processes the harmful URL, potentially leading to arbitrary code execution on the user's machine. This vulnerability has been addressed in version 0.9.4.

Affected Version(s)

Dive >= 0.9.0, < 0.9.4

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-58176 : Remote Code Execution Vulnerability in Dive Application by OpenAgentPlatform