CVE-2026-22792 PUBLISHED

5ire vulnerable to Remote Code Execution (RCE)

Assigner: GitHub_M
Reserved: 09.01.2026 Published: 21.01.2026 Updated: 21.01.2026

5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe HTML rendering permits untrusted HTML (including on* event attributes) to execute in the renderer context. An attacker can inject an <img onerror=...> payload to run arbitrary JavaScript in the renderer, which can call exposed bridge APIs such as window.bridge.mcpServersManager.createServer. This enables unauthorized creation of MCP servers and lead to remote command execution. Version 0.15.3 fixes the issue.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CVSS Score: 9.7

Product Status

Vendor nanbingxyz
Product 5ire
Versions
  • Version < 0.15.3 is affected

References

Problem Types

  • CWE-116: Improper Encoding or Escaping of Output CWE