First published: Wed May 14 2025(Updated: )
5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Versions prior to 0.11.1 are vulnerable to stored cross-site scripting in chatbot responses due to insufficient sanitization. This, in turn, can lead to Remote Code Execution (RCE) via unsafe Electron protocol handling and exposed Electron APIs. All users of 5ire client versions prior to patched releases, particularly those interacting with untrusted chatbots or pasting external content, are affected. Version 0.11.1 contains a patch for the issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
5ire Client | <0.11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-47777 is considered a high severity vulnerability due to the potential for Remote Code Execution (RCE).
To fix CVE-2025-47777, upgrade to version 0.11.1 or later of the 5ire Client that addresses the stored cross-site scripting issue.
CVE-2025-47777 is caused by insufficient sanitization of chatbot responses in the 5ire Client, allowing for stored cross-site scripting attacks.
Versions of the 5ire Client prior to 0.11.1 are affected by CVE-2025-47777.
CVE-2025-47777 can lead to Remote Code Execution, potentially allowing attackers to execute arbitrary code on the affected systems.