Vulnerability Description
5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. In versions 0.15.2 and prior, an RCE vulnerability exists in useMarkdown.ts, where the markdown-it-mermaid plugin is initialized with securityLevel: 'loose'. This configuration explicitly permits the rendering of HTML tags within Mermaid diagram nodes. This issue has not been patched at time of publication.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| 5Ire | 5Ire | < 0.15.2 |
Related Weaknesses (CWE)
References
- https://github.com/nanbingxyz/5ire/blob/c40d05a2b546094789fc727daa5383bb15034442Product
- https://github.com/nanbingxyz/5ire/commit/1fbe40d0bfbfe215370d45b9af856c286d67d3
- https://github.com/nanbingxyz/5ire/releases/tag/v0.15.2Release Notes
- https://github.com/nanbingxyz/5ire/security/advisories/GHSA-5hpf-p8fw-j349ExploitVendor Advisory
- https://github.com/nanbingxyz/5ire/security/advisories/GHSA-5hpf-p8fw-j349ExploitVendor Advisory
FAQ
What is CVE-2025-68669?
CVE-2025-68669 is a vulnerability with a CVSS score of 9.6 (CRITICAL). 5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. In versions 0.15.2 and prior, an RCE vulnerability exists in useMarkdown.ts, where the markdown-it...
How severe is CVE-2025-68669?
CVE-2025-68669 has been rated CRITICAL with a CVSS base score of 9.6/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-68669?
Check the references section above for vendor advisories and patch information. Affected products include: 5Ire 5Ire.