5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Versions prior to 0.11.1 are vulnerable to stored cross-site scripting in chatbot responses due to insufficient sanitization. This, in turn, can lead to Remote Code Execution (RCE) via unsafe Electron protocol handling and exposed Electron APIs. All users of 5ire client versions prior to patched releases, particularly those interacting with untrusted chatbots or pasting external content, are affected. Version 0.11.1 contains a patch for the issue.
References
Configurations
History
22 Jan 2026, 21:26
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
5ire
5ire 5ire |
|
| CPE | cpe:2.3:a:5ire:5ire:*:*:*:*:*:*:*:* | |
| References | () https://github.com/nanbingxyz/5ire/commit/56601e012095194a4be0d4cb6da6b5b3cb53dea8 - Patch | |
| References | () https://github.com/nanbingxyz/5ire/security/advisories/GHSA-mr8w-mmvv-6hq8 - Vendor Advisory | |
| References | () https://positive.security/blog/url-open-rce - Not Applicable | |
| References | () https://shabarkin.notion.site/1-click-RCE-in-Electron-Applications-501c2e96e7934610979cd3c72e844a22 - Not Applicable | |
| References | () https://www.electronjs.org/docs/latest/tutorial/security - Not Applicable | |
| References | () https://www.youtube.com/watch?v=ROFYhS9E9eU - Exploit |
16 May 2025, 14:43
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
14 May 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-14 16:15
Updated : 2026-01-22 21:26
NVD link : CVE-2025-47777
Mitre link : CVE-2025-47777
CVE.ORG link : CVE-2025-47777
JSON object : View
Products Affected
5ire
- 5ire
