5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe option parsing vulnerability in the ECharts Markdown plugin allows any user able to submit ECharts code blocks to execute arbitrary JavaScript code in the renderer context. This can lead to Remote Code Execution (RCE) in environments where privileged APIs (such as Electron’s electron.mcp) are exposed, resulting in full compromise of the host system. Version 0.15.3 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/nanbingxyz/5ire/releases/tag/v0.15.3 | Release Notes |
| https://github.com/nanbingxyz/5ire/security/advisories/GHSA-wg3x-7c26-97wj | Exploit Vendor Advisory |
Configurations
History
29 Jan 2026, 19:58
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/nanbingxyz/5ire/releases/tag/v0.15.3 - Release Notes | |
| References | () https://github.com/nanbingxyz/5ire/security/advisories/GHSA-wg3x-7c26-97wj - Exploit, Vendor Advisory | |
| First Time |
5ire
5ire 5ire |
|
| CPE | cpe:2.3:a:5ire:5ire:*:*:*:*:*:*:*:* |
21 Jan 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-21 21:16
Updated : 2026-01-29 19:58
NVD link : CVE-2026-22793
Mitre link : CVE-2026-22793
CVE.ORG link : CVE-2026-22793
JSON object : View
Products Affected
5ire
- 5ire
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
