Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 06 Feb 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 07 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
5ire
5ire 5ire |
|
| CPEs | cpe:2.3:a:5ire:5ire:*:*:*:*:*:*:*:* | |
| Vendors & Products |
5ire
5ire 5ire |
Wed, 24 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 24 Dec 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nanbingxyz
Nanbingxyz 5ire |
|
| Vendors & Products |
Nanbingxyz
Nanbingxyz 5ire |
Tue, 23 Dec 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | 5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. In versions 0.15.2 and prior, an RCE vulnerability exists in useMarkdown.ts, where the markdown-it-mermaid plugin is initialized with securityLevel: 'loose'. This configuration explicitly permits the rendering of HTML tags within Mermaid diagram nodes. This issue has not been patched at time of publication. | |
| Title | 5ire vulnerable to Remote Code Execution (RCE) via mermaid | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-06T19:29:07.289Z
Reserved: 2025-12-22T23:37:00.930Z
Link: CVE-2025-68669
Updated: 2025-12-24T14:39:25.436Z
Status : Modified
Published: 2025-12-23T23:15:45.470
Modified: 2026-02-06T20:16:08.757
Link: CVE-2025-68669
No data.
OpenCVE Enrichment
Updated: 2025-12-24T11:51:18Z