CVE-2026-22792: CWE-116: Improper Encoding or Escaping of Output in nanbingxyz 5ire
5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe HTML rendering permits untrusted HTML (including on* event attributes) to execute in the renderer context. An attacker can inject an `<img onerror=...>` payload to run arbitrary JavaScript in the renderer, which can call exposed bridge APIs such as `window.bridge.mcpServersManager.createServer`. This enables unauthorized creation of MCP servers and lead to remote command execution. Version 0.15.3 fixes the issue.
AI Analysis
Technical Summary
CVE-2026-22792 is a critical security vulnerability classified under CWE-116 (Improper Encoding or Escaping of Output) affecting nanbingxyz's 5ire, a cross-platform desktop AI assistant and model context protocol client. Versions prior to 0.15.3 improperly handle HTML rendering in the application’s renderer context, allowing untrusted HTML content to execute scripts. Specifically, the vulnerability arises because the renderer permits unsafe HTML including event handler attributes such as onerror in <img> tags. An attacker can craft a payload like <img onerror=...> that executes arbitrary JavaScript within the renderer process. This JavaScript can invoke exposed bridge APIs, for example, window.bridge.mcpServersManager.createServer, enabling unauthorized creation of MCP servers. Such capability can escalate to remote command execution on the host system. The vulnerability requires user interaction (e.g., viewing malicious content) but does not require prior authentication, making it accessible to remote attackers. The flaw impacts confidentiality, integrity, and availability by allowing arbitrary code execution and control over application functions. The issue was publicly disclosed on January 21, 2026, with a CVSS v3.1 score of 9.7 (critical), reflecting its high exploitability and severe impact. The vendor fixed the vulnerability in version 0.15.3 by properly sanitizing and escaping HTML output to prevent script execution. No known exploits in the wild have been reported yet, but the severity and ease of exploitation make it a significant threat. Organizations using affected versions should prioritize upgrading and review content rendering policies to mitigate risk.
Potential Impact
For European organizations, this vulnerability poses a severe risk due to the potential for remote code execution without authentication, which can lead to full compromise of affected systems. Confidentiality is at risk as attackers can execute arbitrary scripts that may access sensitive data. Integrity is compromised because attackers can manipulate application behavior, including unauthorized creation of MCP servers, potentially enabling further lateral movement or persistence. Availability may be impacted if attackers disrupt services or execute destructive commands. Organizations relying on 5ire for AI assistance or model context management could face operational disruptions, data breaches, and reputational damage. The cross-platform nature of 5ire means both Windows and Linux endpoints in enterprises are vulnerable. Given the critical CVSS score and the possibility of user interaction via malicious content, phishing or social engineering campaigns could be used to trigger exploitation. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for remediation. European sectors with high AI adoption, including finance, technology, and research institutions, are particularly at risk due to their reliance on such tools and the sensitivity of their data.
Mitigation Recommendations
1. Immediate upgrade of all 5ire installations to version 0.15.3 or later to apply the official fix. 2. Implement strict content security policies (CSP) to restrict execution of untrusted scripts within the application context. 3. Disable or limit the use of bridge APIs exposed to the renderer process unless absolutely necessary, applying the principle of least privilege. 4. Educate users about the risks of interacting with untrusted or unsolicited content within the 5ire application to reduce the likelihood of triggering the vulnerability. 5. Monitor network and application logs for suspicious activity related to MCP server creation or unusual API calls. 6. Employ endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. 7. If upgrading immediately is not feasible, consider isolating 5ire usage to controlled environments or sandboxed sessions to limit impact. 8. Regularly review and audit third-party integrations and plugins within 5ire that might expose additional attack surfaces. 9. Coordinate with internal security teams to incorporate this vulnerability into threat hunting and incident response plans.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland, Belgium, Switzerland
CVE-2026-22792: CWE-116: Improper Encoding or Escaping of Output in nanbingxyz 5ire
Description
5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe HTML rendering permits untrusted HTML (including on* event attributes) to execute in the renderer context. An attacker can inject an `<img onerror=...>` payload to run arbitrary JavaScript in the renderer, which can call exposed bridge APIs such as `window.bridge.mcpServersManager.createServer`. This enables unauthorized creation of MCP servers and lead to remote command execution. Version 0.15.3 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2026-22792 is a critical security vulnerability classified under CWE-116 (Improper Encoding or Escaping of Output) affecting nanbingxyz's 5ire, a cross-platform desktop AI assistant and model context protocol client. Versions prior to 0.15.3 improperly handle HTML rendering in the application’s renderer context, allowing untrusted HTML content to execute scripts. Specifically, the vulnerability arises because the renderer permits unsafe HTML including event handler attributes such as onerror in <img> tags. An attacker can craft a payload like <img onerror=...> that executes arbitrary JavaScript within the renderer process. This JavaScript can invoke exposed bridge APIs, for example, window.bridge.mcpServersManager.createServer, enabling unauthorized creation of MCP servers. Such capability can escalate to remote command execution on the host system. The vulnerability requires user interaction (e.g., viewing malicious content) but does not require prior authentication, making it accessible to remote attackers. The flaw impacts confidentiality, integrity, and availability by allowing arbitrary code execution and control over application functions. The issue was publicly disclosed on January 21, 2026, with a CVSS v3.1 score of 9.7 (critical), reflecting its high exploitability and severe impact. The vendor fixed the vulnerability in version 0.15.3 by properly sanitizing and escaping HTML output to prevent script execution. No known exploits in the wild have been reported yet, but the severity and ease of exploitation make it a significant threat. Organizations using affected versions should prioritize upgrading and review content rendering policies to mitigate risk.
Potential Impact
For European organizations, this vulnerability poses a severe risk due to the potential for remote code execution without authentication, which can lead to full compromise of affected systems. Confidentiality is at risk as attackers can execute arbitrary scripts that may access sensitive data. Integrity is compromised because attackers can manipulate application behavior, including unauthorized creation of MCP servers, potentially enabling further lateral movement or persistence. Availability may be impacted if attackers disrupt services or execute destructive commands. Organizations relying on 5ire for AI assistance or model context management could face operational disruptions, data breaches, and reputational damage. The cross-platform nature of 5ire means both Windows and Linux endpoints in enterprises are vulnerable. Given the critical CVSS score and the possibility of user interaction via malicious content, phishing or social engineering campaigns could be used to trigger exploitation. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for remediation. European sectors with high AI adoption, including finance, technology, and research institutions, are particularly at risk due to their reliance on such tools and the sensitivity of their data.
Mitigation Recommendations
1. Immediate upgrade of all 5ire installations to version 0.15.3 or later to apply the official fix. 2. Implement strict content security policies (CSP) to restrict execution of untrusted scripts within the application context. 3. Disable or limit the use of bridge APIs exposed to the renderer process unless absolutely necessary, applying the principle of least privilege. 4. Educate users about the risks of interacting with untrusted or unsolicited content within the 5ire application to reduce the likelihood of triggering the vulnerability. 5. Monitor network and application logs for suspicious activity related to MCP server creation or unusual API calls. 6. Employ endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. 7. If upgrading immediately is not feasible, consider isolating 5ire usage to controlled environments or sandboxed sessions to limit impact. 8. Regularly review and audit third-party integrations and plugins within 5ire that might expose additional attack surfaces. 9. Coordinate with internal security teams to incorporate this vulnerability into threat hunting and incident response plans.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-09T18:27:19.389Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69713fb64623b1157cec0b3f
Added to database: 1/21/2026, 9:05:58 PM
Last enriched: 1/21/2026, 9:20:19 PM
Last updated: 1/21/2026, 10:11:43 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23526: CWE-267: Privilege Defined With Unsafe Actions in cvat-ai cvat
HighCVE-2026-23518: CWE-347: Improper Verification of Cryptographic Signature in fleetdm fleet
CriticalCVE-2026-23517: CWE-862: Missing Authorization in fleetdm fleet
MediumCVE-2026-23516: CWE-83: Improper Neutralization of Script in Attributes in a Web Page in cvat-ai cvat
HighCVE-2026-22808: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in fleetdm fleet
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.