प्लेटफ़ॉर्म
javascript
घटक
5ire
में ठीक किया गया
0.15.4
CVE-2026-22793 describes a critical Remote Code Execution (RCE) vulnerability discovered in 5ire, a cross-platform AI assistant. This vulnerability stems from an unsafe option parsing flaw within the ECharts Markdown plugin, enabling attackers to execute arbitrary JavaScript code. The vulnerability impacts versions of 5ire prior to 0.15.3, and a patch is available in version 0.15.3.
The impact of CVE-2026-22793 is severe. An attacker who can submit ECharts code blocks can leverage the unsafe option parsing to execute arbitrary JavaScript code within the renderer context. This is particularly dangerous because 5ire utilizes Electron, which exposes privileged APIs like electron.mcp. Successful exploitation could allow an attacker to gain full control of the host system, including access to sensitive data, installation of malware, and lateral movement within the network. This vulnerability shares similarities with other JavaScript parsing vulnerabilities where malicious code injection can lead to complete system compromise.
CVE-2026-22793 was publicly disclosed on January 21, 2026. The vulnerability's criticality (CVSS 9.7) and the potential for full system compromise suggest a high probability of exploitation. No public proof-of-concept (POC) code has been released as of this writing, but the ease of exploitation given the vulnerability type makes it likely that one will emerge. It is not currently listed on the CISA KEV catalog.
Users of 5ire versions prior to 0.15.3, particularly those deploying 5ire in environments where Electron’s privileged APIs are exposed, are at significant risk. Shared hosting environments where multiple users can submit ECharts code blocks are also particularly vulnerable.
• javascript: Inspect ECharts code blocks submitted by users for suspicious JavaScript code. Look for obfuscated code or attempts to access privileged APIs like electron.mcp.
• windows / supply-chain: Monitor PowerShell execution logs for unusual scripts related to 5ire or ECharts. Use Get-Process to check for unexpected processes spawned by 5ire.
• linux / server: Use journalctl -f to monitor 5ire's logs for errors related to ECharts parsing. Check for unusual file modifications within the 5ire installation directory using lsof or inotify.
• generic web: Examine access logs for requests containing ECharts code blocks. Look for patterns indicative of malicious code injection.
disclosure
एक्सप्लॉइट स्थिति
EPSS
0.30% (53% शतमक)
CISA SSVC
CVSS वेक्टर
The primary mitigation for CVE-2026-22793 is to immediately upgrade 5ire to version 0.15.3 or later. If upgrading is not immediately feasible, consider restricting user input of ECharts code blocks to trusted sources only. While a direct workaround is unavailable, implementing strict input validation and sanitization for ECharts code can reduce the attack surface. Monitor system logs for unusual JavaScript execution patterns. After upgrading, confirm the fix by attempting to submit a malicious ECharts code block and verifying that it is properly sanitized and does not execute.
5ire को 0.15.3 या उच्चतर संस्करण में अपडेट करें। यह संस्करण ECharts Markdown प्लगइन में रिमोट कोड एग्जीक्यूशन (RCE) भेद्यता को ठीक करता है। अपडेट ECharts कोड ब्लॉक के माध्यम से मनमाना जावास्क्रिप्ट कोड के निष्पादन को रोकेगा।
भेद्यता विश्लेषण और गंभीर अलर्ट सीधे आपके ईमेल में।
CVE-2026-22793 is a CRITICAL RCE vulnerability in 5ire versions before 0.15.3. An unsafe parsing flaw in the ECharts Markdown plugin allows attackers to execute JavaScript code, potentially compromising the host system.
Yes, if you are using 5ire version 0.15.3 or earlier, you are vulnerable to this RCE vulnerability. Upgrade immediately.
Upgrade 5ire to version 0.15.3 or later. If upgrading is not possible, restrict user input of ECharts code blocks to trusted sources.
While no public exploits are currently known, the vulnerability's severity and ease of exploitation suggest a high likelihood of future exploitation.
Refer to the 5ire security advisories page for the latest information and official guidance regarding CVE-2026-22793.
अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।