5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Versions prior to 0.11.1 are vulnerable to stored cross-site scripting in chatbot responses due to insufficient sanitization. This, in turn, can lead to Remote Code Execution (RCE) via unsafe Electron protocol handling and exposed Electron APIs. All users of 5ire client versions prior to patched releases, particularly those interacting with untrusted chatbots or pasting external content, are affected. Version 0.11.1 contains a patch for the issue.
Metrics
Affected Vendors & Products
References
History
Wed, 14 May 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 14 May 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | 5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Versions prior to 0.11.1 are vulnerable to stored cross-site scripting in chatbot responses due to insufficient sanitization. This, in turn, can lead to Remote Code Execution (RCE) via unsafe Electron protocol handling and exposed Electron APIs. All users of 5ire client versions prior to patched releases, particularly those interacting with untrusted chatbots or pasting external content, are affected. Version 0.11.1 contains a patch for the issue. | |
Title | 5ire Client Vulnerable to Cross-Site Scripting (XSS) and Remote Code Execution (RCE) | |
Weaknesses | CWE-20 CWE-79 |
|
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-14T15:23:28.565Z
Updated: 2025-05-14T15:39:38.173Z
Reserved: 2025-05-09T19:49:35.620Z
Link: CVE-2025-47777

Updated: 2025-05-14T15:39:33.777Z

Status : Awaiting Analysis
Published: 2025-05-14T16:15:28.957
Modified: 2025-05-16T14:43:56.797
Link: CVE-2025-47777

No data.