CVE-2025-58766

9.0 CRITICAL

📋 TL;DR

This critical vulnerability in Dyad v0.19.0 and earlier allows attackers to execute arbitrary code on users' systems by crafting malicious web content that automatically executes when loaded in the application's preview window. The attack can bypass Docker container protections, potentially giving attackers full control of affected systems. All users running vulnerable versions of Dyad are affected.

💻 Affected Systems

Products:
  • Dyad
Versions: v0.19.0 and earlier
Operating Systems: All platforms where Dyad runs
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the preview window functionality which is a core feature of Dyad. Docker container protections can be bypassed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining root/administrator privileges, data theft, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive data, system configuration changes, and lateral movement within the network.

🟢

If Mitigated

Limited impact if running in isolated environments with strict network segmentation and minimal privileges, though code execution would still be possible within the container.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The advisory suggests exploitation is straightforward via crafted web content. No public exploit code has been identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v0.20.0 and later

Vendor Advisory: https://github.com/dyad-sh/dyad/security/advisories/GHSA-7fxm-c5xx-7vpq

Restart Required: Yes

Instructions:

1. Stop all Dyad instances. 2. Update to v0.20.0 or later using your package manager or by downloading from the official repository. 3. Restart Dyad services.

🔧 Temporary Workarounds

Disable Preview Functionality

all

Temporarily disable the preview window feature to prevent exploitation

Check Dyad configuration for preview settings and disable if possible

Network Isolation

all

Isolate Dyad instances from sensitive networks and the internet

Configure firewall rules to restrict Dyad network access

🧯 If You Can't Patch

  • Isolate affected systems from production networks and the internet
  • Implement strict application whitelisting and monitor for suspicious process execution

🔍 How to Verify

Check if Vulnerable:

Check Dyad version using 'dyad --version' or equivalent command. If version is 0.19.0 or earlier, the system is vulnerable.

Check Version:

dyad --version

Verify Fix Applied:

After updating, verify version is 0.20.0 or later using 'dyad --version'. Test preview functionality with safe content.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution from Dyad context
  • Suspicious network connections originating from Dyad
  • Error logs related to preview window failures

Network Indicators:

  • Unexpected outbound connections from Dyad instances
  • Traffic patterns suggesting command and control communication

SIEM Query:

process.name:"dyad" AND (process.cmdline:*preview* OR process.cmdline:*http*)

🔗 References

📤 Share & Export