Cyber Posture and Threat Data

CVE-2026-22792

Critical

Published: January 21, 2026

CVSS Score 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0044 63.1th percentile

Description

5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe HTML rendering permits untrusted HTML (including on* event attributes) to execute in the renderer context. An attacker can inject an `<img onerror=...>` payload to run arbitrary JavaScript in the renderer, which can call exposed bridge APIs such as `window.bridge.mcpServersManager.createServer`. This enables unauthorized creation of MCP servers and lead to remote command execution. Version 0.15.3 fixes the issue.

Security Summary

CVE-2026-22792 is a high-severity vulnerability (CVSS v3.1 score of 9.6, AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H) affecting 5ire, a cross-platform desktop artificial intelligence assistant and model context protocol client, in versions prior to 0.15.3. The issue arises from unsafe HTML rendering that permits untrusted HTML, including on* event attributes, to execute arbitrary JavaScript directly in the renderer context (CWE-116).

A remote attacker can exploit this by injecting a payload such as an <img onerror=...> tag, which triggers JavaScript execution in the renderer. This allows the attacker to call exposed bridge APIs, for example window.bridge.mcpServersManager.createServer, enabling unauthorized creation of MCP servers and ultimately leading to remote command execution on the victim's machine. Exploitation requires user interaction, such as rendering malicious content, but needs no privileges.

The vulnerability is fixed in version 0.15.3 of 5ire. Security practitioners should update to this version immediately. Additional details are available in the GitHub security advisory (https://github.com/nanbingxyz/5ire/security/advisories/GHSA-p5fm-wm8g-rffx) and release notes (https://github.com/nanbingxyz/5ire/releases/tag/v0.15.3).

As an AI assistant handling model context protocols, 5ire's exposure underscores risks in desktop AI applications where renderer-process interactions can escalate to system compromise. No public evidence of real-world exploitation is noted as of the CVE publication on 2026-01-21.

Details

CWE(s)
CWE-116

AI Security Analysis

AI Category
AI Agent Protocols and Integrations
Risk Domain
Protocol-Specific Risks
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
Matched keywords: artificial intelligence, model context protocol, mcp

MITRE ATT&CK Enterprise Techniques

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References