CVE-2026-22792
January 21, 2026
5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe HTML rendering permits untrusted HTML (including on* event attributes) to execute in the renderer context. An attacker can inject an "<img onerror=...>" payload to run arbitrary JavaScript in the renderer, which can call exposed bridge APIs such as "window.bridge.mcpServersManager.createServer". This enables unauthorized creation of MCP servers and lead to remote command execution. Version 0.15.3 fixes the issue.
Affected Packages
https://github.com/nanbingxyz/5ire.git (GITHUB):
Affected version(s) >=v0.7.5 <v0.15.3Fix Suggestion:
Update to version v0.15.3Related ResourcesĀ (2)
Do you need more information?
Contact UsCVSS v4
Base Score:
9.4
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
PASSIVE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
HIGH
Subsequent System Integrity
HIGH
Subsequent System Availability
HIGH
CVSS v3
Base Score:
9.6
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
Weakness Type (CWE)
Improper Encoding or Escaping of Output
EPSS
Base Score:
0.24