Description
5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe HTML rendering permits untrusted HTML (including on* event attributes) to execute in the renderer context. An attacker can inject an `<img onerror=...>` payload to run arbitrary JavaScript in the renderer, which can call exposed bridge APIs such as `window.bridge.mcpServersManager.createServer`. This enables unauthorized creation of MCP servers and lead to remote command execution. Version 0.15.3 fixes the issue.
Published: 2026-01-21
Score: 9.7 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Apply Patch
AI Analysis

Impact

An unsafe HTML rendering path in 5ire allows untrusted HTML—including event handler attributes—to be executed in the renderer process. By injecting a payload such as `<img onerror=...>`, an attacker can run arbitrary JavaScript. This JavaScript can call exposed bridge APIs like `window.bridge.mcpServersManager.createServer`, enabling the attacker to create new MCP servers and ultimately execute remote commands on the host system.

Affected Systems

The vulnerability affects the 5ire application developed by nanbingxyz. All releases prior to version 0.15.3 are impacted. Version 0.15.3 and later contain the fix.

Risk and Exploitability

The vulnerability has a CVSS score of 9.7, indicating critical severity. The EPSS score is less than 1%, suggesting a low probability of exploitation as of this analysis, and the vulnerability is not listed in CISA’s KEV catalog. Based on the description, the attack requires delivery of malicious HTML content to the renderer, which could be achieved by an attacker who can influence the content viewed by the application. The bridge API exposure further elevates the impact to full remote code execution on the host.

Generated by OpenCVE AI on April 18, 2026 at 15:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade 5ire to version 0.15.3 or later to apply the vendor-provided fix.
  • Disable or limit the use of the `window.bridge.mcpServersManager.createServer` API by configuring the application or removing the feature if it is not required.
  • Monitor the application logs for any unauthorized creation of MCP servers and review access controls to mitigate potential misuse.

Generated by OpenCVE AI on April 18, 2026 at 15:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 29 Jan 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared 5ire
5ire 5ire
CPEs cpe:2.3:a:5ire:5ire:*:*:*:*:*:*:*:*
Vendors & Products 5ire
5ire 5ire

Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Nanbingxyz
Nanbingxyz 5ire
Vendors & Products Nanbingxyz
Nanbingxyz 5ire

Wed, 21 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 21 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Description 5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe HTML rendering permits untrusted HTML (including on* event attributes) to execute in the renderer context. An attacker can inject an `<img onerror=...>` payload to run arbitrary JavaScript in the renderer, which can call exposed bridge APIs such as `window.bridge.mcpServersManager.createServer`. This enables unauthorized creation of MCP servers and lead to remote command execution. Version 0.15.3 fixes the issue.
Title 5ire vulnerable to Remote Code Execution (RCE)
Weaknesses CWE-116
References
Metrics cvssV3_1

{'score': 9.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-21T21:26:47.676Z

Reserved: 2026-01-09T18:27:19.389Z

Link: CVE-2026-22792

cve-icon Vulnrichment

Updated: 2026-01-21T21:26:43.295Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-21T21:16:09.957

Modified: 2026-01-29T19:46:50.240

Link: CVE-2026-22792

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T15:45:04Z

Weaknesses