5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe option parsing vulnerability in the ECharts Markdown plugin allows any user able to submit ECharts code blocks to execute arbitrary JavaScript code in the renderer context. This can lead to Remote Code Execution (RCE) in environments where privileged APIs (such as Electron’s electron.mcp) are exposed, resulting in full compromise of the host system. Version 0.15.3 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/nanbingxyz/5ire/releases/tag/v0.15.3 | Release Notes |
| https://github.com/nanbingxyz/5ire/security/advisories/GHSA-wg3x-7c26-97wj | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-21 21:16
Updated : 2026-01-29 19:58
NVD link : CVE-2026-22793
Mitre link : CVE-2026-22793
CVE.ORG link : CVE-2026-22793
JSON object : View
Products Affected
5ire
- 5ire
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
