icon

We found results for “

CVE-2025-59053

Good to know:

icon
icon

Date: September 11, 2025

AIRI is a self-hosted, artificial intelligence based Grok Companion. In v0.7.2-beta.2 in the "packages/stage-ui/src/components/MarkdownRenderer.vue" path, the Markdown content is processed using the useMarkdown composable, and the processed HTML is rendered directly into the DOM using v-html. An attacker creates a card file containing malicious HTML/JavaScript, then simply processes it using the highlightTagToHtml function (which simply replaces template tags without HTML escaping), and then directly renders it using v-html, leading to cross-site scripting (XSS). The project also exposes the Tauri API, which can be called from the frontend. The MCP plugin exposes a command execution interface function in "crates/tauri-plugin-mcp/src/lib.rs". This allows arbitrary command execution. "connect_server" directly passes the user-supplied "command" and "args" parameters to "Command::new(command).args(args)" without any input validation or whitelisting. Thus, the previous XSS exploit could achieve command execution through this interface. v0.7.2-beta.3 fixes the issue.

Severity Score

Severity Score

Weakness Type (CWE)

Improper Control of Generation of Code ('Code Injection')

CWE-94

Top Fix

icon

Upgrade Version

Upgrade to version https://github.com/moeru-ai/airi.git - v0.7.2-beta.3

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): REQUIRED
Scope (S): CHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us