CVE-2026-22793 PUBLISHED

5ire vulnerable to Remote Code Execution (RCE) via ECharts

Assigner: GitHub_M
Reserved: 09.01.2026 Published: 21.01.2026 Updated: 21.01.2026

5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe option parsing vulnerability in the ECharts Markdown plugin allows any user able to submit ECharts code blocks to execute arbitrary JavaScript code in the renderer context. This can lead to Remote Code Execution (RCE) in environments where privileged APIs (such as Electron’s electron.mcp) are exposed, resulting in full compromise of the host system. Version 0.15.3 patches the issue.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CVSS Score: 9.7

Product Status

Vendor nanbingxyz
Product 5ire
Versions
  • Version < 0.15.3 is affected

References

Problem Types

  • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE