VYPR
High severity7.8NVD Advisory· Published Feb 18, 2026· Updated Apr 15, 2026

CVE-2025-61982

CVE-2025-61982

Description

An arbitrary code execution vulnerability exists in the Code Stream directive functionality of OpenCFD OpenFOAM 2506. A specially crafted OpenFOAM simulation file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

OpenFOAM 2506's #codeStream directive compiles and executes arbitrary C++ code from simulation files, allowing code injection with no user warning.

Vulnerability

Overview

CVE-2025-61982 is an arbitrary code execution vulnerability in OpenCFD OpenFOAM 2506, a popular computational fluid dynamics (CFD) open-source software. The flaw resides in the #codeStream directive functionality within dictionary files (e.g., controlDict, meshDict). These files are part of the simulation input structure and can contain C++ code that is automatically compiled and executed during simulation runtime [1].

Exploitation

Details

An attacker can craft a malicious OpenFOAM simulation file containing a #codeStream directive with arbitrary C++ code, including calls to system functions like system(). The vulnerability. The attack vector is local (AV:L) and requires user interaction (UI:R), meaning the victim must open the malicious file. No authentication is needed (PR:N). The allowSystemOperations option, which can disable this behavior, defaults to true and no warning is presented to users about the risk of running untrusted simulations [1].

Impact

Successful exploitation allows an attacker to execute arbitrary code with the privileges of the user running the simulation, leading to full compromise of confidentiality, integrity, and availability (C:H/I:H/A:H). The CVSS v3.1 score is 7.8 (High) [1).

Mitigation

As of the publication date (2026-02-18), no patch has been announced. Users should set allowSystemOperations false in the OpenFOAM configuration file to disable automatic code generation and execution. However, this is a manual workaround and not a default setting. Users are advised to only run simulation files from trusted sources [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.