Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22792: CWE-116: Improper Encoding or Escaping of Output in nanbingxyz 5ire

0
Critical
VulnerabilityCVE-2026-22792cvecve-2026-22792cwe-116
Published: Wed Jan 21 2026 (01/21/2026, 20:54:18 UTC)
Source: CVE Database V5
Vendor/Project: nanbingxyz
Product: 5ire

Description

5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe HTML rendering permits untrusted HTML (including on* event attributes) to execute in the renderer context. An attacker can inject an `<img onerror=...>` payload to run arbitrary JavaScript in the renderer, which can call exposed bridge APIs such as `window.bridge.mcpServersManager.createServer`. This enables unauthorized creation of MCP servers and lead to remote command execution. Version 0.15.3 fixes the issue.

AI-Powered Analysis

AILast updated: 01/21/2026, 21:20:19 UTC

Technical Analysis

CVE-2026-22792 is a critical security vulnerability classified under CWE-116 (Improper Encoding or Escaping of Output) affecting nanbingxyz's 5ire, a cross-platform desktop AI assistant and model context protocol client. Versions prior to 0.15.3 improperly handle HTML rendering in the application’s renderer context, allowing untrusted HTML content to execute scripts. Specifically, the vulnerability arises because the renderer permits unsafe HTML including event handler attributes such as onerror in <img> tags. An attacker can craft a payload like <img onerror=...> that executes arbitrary JavaScript within the renderer process. This JavaScript can invoke exposed bridge APIs, for example, window.bridge.mcpServersManager.createServer, enabling unauthorized creation of MCP servers. Such capability can escalate to remote command execution on the host system. The vulnerability requires user interaction (e.g., viewing malicious content) but does not require prior authentication, making it accessible to remote attackers. The flaw impacts confidentiality, integrity, and availability by allowing arbitrary code execution and control over application functions. The issue was publicly disclosed on January 21, 2026, with a CVSS v3.1 score of 9.7 (critical), reflecting its high exploitability and severe impact. The vendor fixed the vulnerability in version 0.15.3 by properly sanitizing and escaping HTML output to prevent script execution. No known exploits in the wild have been reported yet, but the severity and ease of exploitation make it a significant threat. Organizations using affected versions should prioritize upgrading and review content rendering policies to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a severe risk due to the potential for remote code execution without authentication, which can lead to full compromise of affected systems. Confidentiality is at risk as attackers can execute arbitrary scripts that may access sensitive data. Integrity is compromised because attackers can manipulate application behavior, including unauthorized creation of MCP servers, potentially enabling further lateral movement or persistence. Availability may be impacted if attackers disrupt services or execute destructive commands. Organizations relying on 5ire for AI assistance or model context management could face operational disruptions, data breaches, and reputational damage. The cross-platform nature of 5ire means both Windows and Linux endpoints in enterprises are vulnerable. Given the critical CVSS score and the possibility of user interaction via malicious content, phishing or social engineering campaigns could be used to trigger exploitation. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for remediation. European sectors with high AI adoption, including finance, technology, and research institutions, are particularly at risk due to their reliance on such tools and the sensitivity of their data.

Mitigation Recommendations

1. Immediate upgrade of all 5ire installations to version 0.15.3 or later to apply the official fix. 2. Implement strict content security policies (CSP) to restrict execution of untrusted scripts within the application context. 3. Disable or limit the use of bridge APIs exposed to the renderer process unless absolutely necessary, applying the principle of least privilege. 4. Educate users about the risks of interacting with untrusted or unsolicited content within the 5ire application to reduce the likelihood of triggering the vulnerability. 5. Monitor network and application logs for suspicious activity related to MCP server creation or unusual API calls. 6. Employ endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. 7. If upgrading immediately is not feasible, consider isolating 5ire usage to controlled environments or sandboxed sessions to limit impact. 8. Regularly review and audit third-party integrations and plugins within 5ire that might expose additional attack surfaces. 9. Coordinate with internal security teams to incorporate this vulnerability into threat hunting and incident response plans.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-09T18:27:19.389Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69713fb64623b1157cec0b3f

Added to database: 1/21/2026, 9:05:58 PM

Last enriched: 1/21/2026, 9:20:19 PM

Last updated: 1/21/2026, 10:11:43 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats