Dive is an open-source MCP Host Desktop Application that enables integration with function-calling LLMs. A critical Stored Cross-Site Scripting (XSS) vulnerability exists in versions prior to 0.11.1 in the Mermaid diagram rendering component. The application allows the execution of arbitrary JavaScript via `javascript:`. An attacker can exploit this to inject a malicious Model Context Protocol (MCP) server configuration, leading to Remote Code Execution (RCE) on the victim's machine when the node is clicked. Version 0.11.1 fixes the issue.
History

Fri, 19 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 19 Dec 2025 16:45:00 +0000

Type Values Removed Values Added
Description Dive is an open-source MCP Host Desktop Application that enables integration with function-calling LLMs. A critical Stored Cross-Site Scripting (XSS) vulnerability exists in versions prior to 0.11.1 in the Mermaid diagram rendering component. The application allows the execution of arbitrary JavaScript via `javascript:`. An attacker can exploit this to inject a malicious Model Context Protocol (MCP) server configuration, leading to Remote Code Execution (RCE) on the victim's machine when the node is clicked. Version 0.11.1 fixes the issue.
Title Dive has Cross-Site Scripting vulnerability that can escalate to Remote Code Execution
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 9.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-12-19T18:00:19.349Z

Reserved: 2025-12-04T18:53:42.398Z

Link: CVE-2025-66580

cve-icon Vulnrichment

Updated: 2025-12-19T17:24:02.289Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-19T17:15:53.243

Modified: 2025-12-19T18:15:51.210

Link: CVE-2025-66580

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.