CVE-2026-22792
Published: January 21, 2026
Description
5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe HTML rendering permits untrusted HTML (including on* event attributes) to execute in the renderer context. An attacker can inject an `<img onerror=...>` payload to run arbitrary JavaScript in the renderer, which can call exposed bridge APIs such as `window.bridge.mcpServersManager.createServer`. This enables unauthorized creation of MCP servers and lead to remote command execution. Version 0.15.3 fixes the issue.
Security Summary
CVE-2026-22792 is a high-severity vulnerability (CVSS v3.1 score of 9.6, AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H) affecting 5ire, a cross-platform desktop artificial intelligence assistant and model context protocol client, in versions prior to 0.15.3. The issue arises from unsafe HTML rendering that permits untrusted HTML, including on* event attributes, to execute arbitrary JavaScript directly in the renderer context (CWE-116).
A remote attacker can exploit this by injecting a payload such as an <img onerror=...> tag, which triggers JavaScript execution in the renderer. This allows the attacker to call exposed bridge APIs, for example window.bridge.mcpServersManager.createServer, enabling unauthorized creation of MCP servers and ultimately leading to remote command execution on the victim's machine. Exploitation requires user interaction, such as rendering malicious content, but needs no privileges.
The vulnerability is fixed in version 0.15.3 of 5ire. Security practitioners should update to this version immediately. Additional details are available in the GitHub security advisory (https://github.com/nanbingxyz/5ire/security/advisories/GHSA-p5fm-wm8g-rffx) and release notes (https://github.com/nanbingxyz/5ire/releases/tag/v0.15.3).
As an AI assistant handling model context protocols, 5ire's exposure underscores risks in desktop AI applications where renderer-process interactions can escalate to system compromise. No public evidence of real-world exploitation is noted as of the CVE publication on 2026-01-21.
Details
- CWE(s)
AI Security Analysis
- AI Category
- AI Agent Protocols and Integrations
- Risk Domain
- Protocol-Specific Risks
- OWASP Top 10 for LLMs 2025
- None mapped
- MITRE ATLAS Techniques
- None mapped
- Classification Reason
- Matched keywords: artificial intelligence, model context protocol, mcp