← Back to CVEs
CVE-2026-22793
CRITICAL9.6
Description
5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe option parsing vulnerability in the ECharts Markdown plugin allows any user able to submit ECharts code blocks to execute arbitrary JavaScript code in the renderer context. This can lead to Remote Code Execution (RCE) in environments where privileged APIs (such as Electron’s electron.mcp) are exposed, resulting in full compromise of the host system. Version 0.15.3 patches the issue.
CVE Details
CVSS v3.1 Score9.6
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published1/21/2026
Last Modified1/29/2026
Sourcenvd
Honeypot Sightings0
Affected Products
5ire:5ire
Weaknesses (CWE)
CWE-94
References
https://github.com/nanbingxyz/5ire/releases/tag/v0.15.3(security-advisories@github.com)
https://github.com/nanbingxyz/5ire/security/advisories/GHSA-wg3x-7c26-97wj(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.