Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-58766 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A Code Injection flaw in **Dyad** (AI app builder). <br>πŸ’₯ **Consequences**: The preview window bypasses Docker container isolation.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-94** (Code Injection).…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **Dyad** by **dyad-sh**. <br>πŸ“… **Version**: **0.19.0 and earlier**. <br>⚠️ **Note**: Any instance running these versions is vulnerable.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Actions**: <br>1. Execute **arbitrary commands** on the host. <br>2. Access sensitive **data** (High Confidentiality). <br>3. Modify system **configurations** (High Integrity). <br>4.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Threshold**: **Medium**. <br>πŸ”’ **Auth**: Requires **Low Privileges** (PR:L). <br>πŸ‘€ **UI**: Requires **User Interaction** (UI:R) – likely clicking a preview button. <br>🌐 **Network**: **Remote** (AV:N) exploitable.

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exploit**: **No**. <br>πŸ“‚ **PoCs**: The `pocs` field is empty. <br>πŸ“’ **Status**: While no public PoC exists, the CVSS score (9.8) indicates high severity.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: <br>1. Check your Dyad version (`< 0.19.0`). <br>2. Verify if the **Preview Window** feature is enabled. <br>3. Scan for Docker container escape attempts in logs. <br>4.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: **Yes**. <br>πŸ”— **Patch**: Refer to GitHub Advisory **GHSA-7fxm-c5xx-7vpq**. <br>πŸ”„ **Action**: Update to the patched version immediately. See commit `1c0255ab` for details.

Q9What if no patch? (Workaround)

πŸ›‘οΈ **No Patch Workaround**: <br>1. **Disable** the Preview Window feature entirely. <br>2. Isolate Dyad in a stricter network segment. <br>3. Restrict user permissions to prevent unauthorized preview requests.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL** (Priority 1). <br>πŸ“‰ **CVSS**: **9.8** (Critical). <br>⏳ **Action**: Patch immediately.…