CVE-2025-61982
Description
An arbitrary code execution vulnerability exists in the Code Stream directive functionality of OpenCFD OpenFOAM 2506. A specially crafted OpenFOAM simulation file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
OpenFOAM 2506's #codeStream directive compiles and executes arbitrary C++ code from simulation files, allowing code injection with no user warning.
Vulnerability
Overview
CVE-2025-61982 is an arbitrary code execution vulnerability in OpenCFD OpenFOAM 2506, a popular computational fluid dynamics (CFD) open-source software. The flaw resides in the #codeStream directive functionality within dictionary files (e.g., controlDict, meshDict). These files are part of the simulation input structure and can contain C++ code that is automatically compiled and executed during simulation runtime [1].
Exploitation
Details
An attacker can craft a malicious OpenFOAM simulation file containing a #codeStream directive with arbitrary C++ code, including calls to system functions like system(). The vulnerability. The attack vector is local (AV:L) and requires user interaction (UI:R), meaning the victim must open the malicious file. No authentication is needed (PR:N). The allowSystemOperations option, which can disable this behavior, defaults to true and no warning is presented to users about the risk of running untrusted simulations [1].
Impact
Successful exploitation allows an attacker to execute arbitrary code with the privileges of the user running the simulation, leading to full compromise of confidentiality, integrity, and availability (C:H/I:H/A:H). The CVSS v3.1 score is 7.8 (High) [1).
Mitigation
As of the publication date (2026-02-18), no patch has been announced. Users should set allowSystemOperations false in the OpenFOAM configuration file to disable automatic code generation and execution. However, this is a manual workaround and not a default setting. Users are advised to only run simulation files from trusted sources [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.