CVE-2026-22793

5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe option parsing vulnerability in the ECharts Markdown plugin allows any user able to submit ECharts code blocks to execute arbitrary JavaScript code in the renderer context. This can lead to Remote Code Execution (RCE) in environments where privileged APIs (such as Electron’s electron.mcp) are exposed, resulting in full compromise of the host system. Version 0.15.3 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:5ire:5ire:*:*:*:*:*:*:*:*

History

29 Jan 2026, 19:58

Type Values Removed Values Added
References () https://github.com/nanbingxyz/5ire/releases/tag/v0.15.3 - () https://github.com/nanbingxyz/5ire/releases/tag/v0.15.3 - Release Notes
References () https://github.com/nanbingxyz/5ire/security/advisories/GHSA-wg3x-7c26-97wj - () https://github.com/nanbingxyz/5ire/security/advisories/GHSA-wg3x-7c26-97wj - Exploit, Vendor Advisory
First Time 5ire
5ire 5ire
CPE cpe:2.3:a:5ire:5ire:*:*:*:*:*:*:*:*

21 Jan 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-21 21:16

Updated : 2026-01-29 19:58


NVD link : CVE-2026-22793

Mitre link : CVE-2026-22793

CVE.ORG link : CVE-2026-22793


JSON object : View

Products Affected

5ire

  • 5ire
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')