Home » Database

AVID-2026-R1709

Description

5ire Client Vulnerable to Cross-Site Scripting (XSS) and Remote Code Execution (RCE) (CVE-2025-47777)

Details

5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Versions prior to 0.11.1 are vulnerable to stored cross-site scripting in chatbot responses due to insufficient sanitization. This, in turn, can lead to Remote Code Execution (RCE) via unsafe Electron protocol handling and exposed Electron APIs. All users of 5ire client versions prior to patched releases, particularly those interacting with untrusted chatbots or pasting external content, are affected. Version 0.11.1 contains a patch for the issue.

Reason for inclusion in AVID: CVE-2025-47777 describes a stored XSS and RCE in the 5ire desktop AI assistant client (Electron-based). This is a software vulnerability in a component used to interact with AI systems, potentially exploited in AI workflows; it affects software used in AI tooling and deployment, thus a software supply-chain vulnerability in AI stacks. Evidence includes CVE text, description, and patch info.

References

Affected or Relevant Artifacts

  • Developer: nanbingxyz
  • Deployer: nanbingxyz
  • Artifact Details:
TypeName
System5ire

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Base Score9.7
Base Severity🔴 Critical
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionREQUIRED
ScopeCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-20CWE-20: Improper Input Validation
CWE-79CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2025-05-14
  • Version: 0.3.3
  • AVID Entry