Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 29 Jan 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
5ire
5ire 5ire |
|
| CPEs | cpe:2.3:a:5ire:5ire:*:*:*:*:*:*:*:* | |
| Vendors & Products |
5ire
5ire 5ire |
Fri, 23 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nanbingxyz
Nanbingxyz 5ire |
|
| Vendors & Products |
Nanbingxyz
Nanbingxyz 5ire |
Wed, 21 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 21 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | 5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe HTML rendering permits untrusted HTML (including on* event attributes) to execute in the renderer context. An attacker can inject an `<img onerror=...>` payload to run arbitrary JavaScript in the renderer, which can call exposed bridge APIs such as `window.bridge.mcpServersManager.createServer`. This enables unauthorized creation of MCP servers and lead to remote command execution. Version 0.15.3 fixes the issue. | |
| Title | 5ire vulnerable to Remote Code Execution (RCE) | |
| Weaknesses | CWE-116 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-21T21:26:47.676Z
Reserved: 2026-01-09T18:27:19.389Z
Link: CVE-2026-22792
Updated: 2026-01-21T21:26:43.295Z
Status : Analyzed
Published: 2026-01-21T21:16:09.957
Modified: 2026-01-29T19:46:50.240
Link: CVE-2026-22792
No data.
OpenCVE Enrichment
Updated: 2026-04-18T15:45:04Z