Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2026-22792

5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe HTML rendering permits untrusted HTML (including on* event attributes) to execute in the renderer context. An attacker can inject an `<img onerror=...>` payload to run arbitrary JavaScript in the renderer, which can call exposed bridge APIs such as `window.bridge.mcpServersManager.createServer`. This enables unauthorized creation of MCP servers and lead to remote command execution. Version 0.15.3 fixes the issue.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 33.2%
CVSS Severity
CVSS v3 Score 9.6
Products affected by CVE-2026-22792
  • 5ire » 5ire » Version: 0.10.0
    cpe:2.3:a:5ire:5ire:0.10.0
  • 5ire » 5ire » Version: 0.10.1
    cpe:2.3:a:5ire:5ire:0.10.1
  • 5ire » 5ire » Version: 0.11.0
    cpe:2.3:a:5ire:5ire:0.11.0
  • 5ire » 5ire » Version: 0.11.1
    cpe:2.3:a:5ire:5ire:0.11.1
  • 5ire » 5ire » Version: 0.11.2
    cpe:2.3:a:5ire:5ire:0.11.2
  • 5ire » 5ire » Version: 0.11.3
    cpe:2.3:a:5ire:5ire:0.11.3
  • 5ire » 5ire » Version: 0.12.0
    cpe:2.3:a:5ire:5ire:0.12.0
  • 5ire » 5ire » Version: 0.12.1
    cpe:2.3:a:5ire:5ire:0.12.1
  • 5ire » 5ire » Version: 0.13.0
    cpe:2.3:a:5ire:5ire:0.13.0
  • 5ire » 5ire » Version: 0.13.1
    cpe:2.3:a:5ire:5ire:0.13.1
  • 5ire » 5ire » Version: 0.13.2
    cpe:2.3:a:5ire:5ire:0.13.2
  • 5ire » 5ire » Version: 0.14.0
    cpe:2.3:a:5ire:5ire:0.14.0
  • 5ire » 5ire » Version: 0.14.1
    cpe:2.3:a:5ire:5ire:0.14.1
  • 5ire » 5ire » Version: 0.15.0
    cpe:2.3:a:5ire:5ire:0.15.0
  • 5ire » 5ire » Version: 0.15.1
    cpe:2.3:a:5ire:5ire:0.15.1
  • 5ire » 5ire » Version: 0.15.2
    cpe:2.3:a:5ire:5ire:0.15.2
  • 5ire » 5ire » Version: 0.7.5
    cpe:2.3:a:5ire:5ire:0.7.5
  • 5ire » 5ire » Version: 0.7.6
    cpe:2.3:a:5ire:5ire:0.7.6
  • 5ire » 5ire » Version: 0.7.7
    cpe:2.3:a:5ire:5ire:0.7.7
  • 5ire » 5ire » Version: 0.7.8
    cpe:2.3:a:5ire:5ire:0.7.8
  • 5ire » 5ire » Version: 0.7.9
    cpe:2.3:a:5ire:5ire:0.7.9
  • 5ire » 5ire » Version: 0.8.0
    cpe:2.3:a:5ire:5ire:0.8.0
  • 5ire » 5ire » Version: 0.8.1
    cpe:2.3:a:5ire:5ire:0.8.1
  • 5ire » 5ire » Version: 0.8.2
    cpe:2.3:a:5ire:5ire:0.8.2
  • 5ire » 5ire » Version: 0.8.3
    cpe:2.3:a:5ire:5ire:0.8.3
  • 5ire » 5ire » Version: 0.8.4
    cpe:2.3:a:5ire:5ire:0.8.4
  • 5ire » 5ire » Version: 0.9.0
    cpe:2.3:a:5ire:5ire:0.9.0
  • 5ire » 5ire » Version: 0.9.1
    cpe:2.3:a:5ire:5ire:0.9.1
  • 5ire » 5ire » Version: 0.9.2
    cpe:2.3:a:5ire:5ire:0.9.2
  • 5ire » 5ire » Version: 0.9.3
    cpe:2.3:a:5ire:5ire:0.9.3
  • 5ire » 5ire » Version: 0.9.4
    cpe:2.3:a:5ire:5ire:0.9.4
  • 5ire » 5ire » Version: 0.9.5
    cpe:2.3:a:5ire:5ire:0.9.5
  • 5ire » 5ire » Version: 0.9.6
    cpe:2.3:a:5ire:5ire:0.9.6
  • 5ire » 5ire » Version: 0.9.7
    cpe:2.3:a:5ire:5ire:0.9.7
  • 5ire » 5ire » Version: 0.9.8
    cpe:2.3:a:5ire:5ire:0.9.8
  • 5ire » 5ire » Version: 0.9.9
    cpe:2.3:a:5ire:5ire:0.9.9


Contact Us

Shodan ® - All rights reserved