cve-2025-47777
Vulnerability from cvelistv5
Published
2025-05-14 15:23
Modified
2025-05-14 15:39
Severity ?
EPSS score ?
Summary
5ire Client Vulnerable to Cross-Site Scripting (XSS) and Remote Code Execution (RCE)
References
Impacted products
▼ | Vendor | Product |
---|---|---|
nanbingxyz | 5ire |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-47777", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-14T15:39:28.619898Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-14T15:39:38.173Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "5ire", "vendor": "nanbingxyz", "versions": [ { "status": "affected", "version": "\u003c 0.11.1" } ] } ], "descriptions": [ { "lang": "en", "value": "5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Versions prior to 0.11.1 are vulnerable to stored cross-site scripting in chatbot responses due to insufficient sanitization. This, in turn, can lead to Remote Code Execution (RCE) via unsafe Electron protocol handling and exposed Electron APIs. All users of 5ire client versions prior to patched releases, particularly those interacting with untrusted chatbots or pasting external content, are affected. Version 0.11.1 contains a patch for the issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.7, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-14T15:23:28.565Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nanbingxyz/5ire/security/advisories/GHSA-mr8w-mmvv-6hq8", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nanbingxyz/5ire/security/advisories/GHSA-mr8w-mmvv-6hq8" }, { "name": "https://github.com/nanbingxyz/5ire/commit/56601e012095194a4be0d4cb6da6b5b3cb53dea8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nanbingxyz/5ire/commit/56601e012095194a4be0d4cb6da6b5b3cb53dea8" }, { "name": "https://positive.security/blog/url-open-rce", "tags": [ "x_refsource_MISC" ], "url": "https://positive.security/blog/url-open-rce" }, { "name": "https://shabarkin.notion.site/1-click-RCE-in-Electron-Applications-501c2e96e7934610979cd3c72e844a22", "tags": [ "x_refsource_MISC" ], "url": "https://shabarkin.notion.site/1-click-RCE-in-Electron-Applications-501c2e96e7934610979cd3c72e844a22" }, { "name": "https://www.electronjs.org/docs/latest/tutorial/security", "tags": [ "x_refsource_MISC" ], "url": "https://www.electronjs.org/docs/latest/tutorial/security" }, { "name": "https://www.youtube.com/watch?v=ROFYhS9E9eU", "tags": [ "x_refsource_MISC" ], "url": "https://www.youtube.com/watch?v=ROFYhS9E9eU" } ], "source": { "advisory": "GHSA-mr8w-mmvv-6hq8", "discovery": "UNKNOWN" }, "title": "5ire Client Vulnerable to Cross-Site Scripting (XSS) and Remote Code Execution (RCE)" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-47777", "datePublished": "2025-05-14T15:23:28.565Z", "dateReserved": "2025-05-09T19:49:35.620Z", "dateUpdated": "2025-05-14T15:39:38.173Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-47777\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-05-14T16:15:28.957\",\"lastModified\":\"2025-05-16T14:43:56.797\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Versions prior to 0.11.1 are vulnerable to stored cross-site scripting in chatbot responses due to insufficient sanitization. This, in turn, can lead to Remote Code Execution (RCE) via unsafe Electron protocol handling and exposed Electron APIs. All users of 5ire client versions prior to patched releases, particularly those interacting with untrusted chatbots or pasting external content, are affected. Version 0.11.1 contains a patch for the issue.\"},{\"lang\":\"es\",\"value\":\"5ire es un asistente de inteligencia artificial multiplataforma de escritorio y un cliente de protocolo de contexto de modelo. Las versiones anteriores a la 0.11.1 son vulnerables a cross-site scripting almacenado en las respuestas de los chatbots debido a una limpieza insuficiente. Esto, a su vez, puede provocar la ejecuci\u00f3n remota de c\u00f3digo (RCE) mediante la gesti\u00f3n insegura del protocolo Electron y la exposici\u00f3n de las API de Electron. Todos los usuarios de versiones del cliente 5ire anteriores a las actualizaciones, en particular aquellos que interact\u00faan con chatbots no confiables o comparten contenido externo, se ven afectados. La versi\u00f3n 0.11.1 incluye un parche para este problema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":9.6,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"},{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"references\":[{\"url\":\"https://github.com/nanbingxyz/5ire/commit/56601e012095194a4be0d4cb6da6b5b3cb53dea8\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/nanbingxyz/5ire/security/advisories/GHSA-mr8w-mmvv-6hq8\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://positive.security/blog/url-open-rce\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://shabarkin.notion.site/1-click-RCE-in-Electron-Applications-501c2e96e7934610979cd3c72e844a22\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://www.electronjs.org/docs/latest/tutorial/security\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://www.youtube.com/watch?v=ROFYhS9E9eU\",\"source\":\"security-advisories@github.com\"}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.