Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-59053 β€” AI Deep Analysis Summary

CVSS 9.7 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Project AIRI (v0.7.2-beta.2) has a critical code injection flaw.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: The `MarkdownRenderer.vue` component uses `v-html` to render unescaped HTML. ⚠️ **Flaw**: No validation on user inputs (`command` and `args`), leading to CWE-94 (Code Injection).

Q3Who is affected? (Versions/Components)

🎯 **Affected**: Users running **Project AIRI version 0.7.2-beta.2**. πŸ“¦ **Component**: Specifically the `MarkdownRenderer.vue` module within the moeru-ai product.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Privileges**: Full command execution capabilities. πŸ“‚ **Data**: Potential for XSS attacks stealing session cookies or sensitive user inputs. Total control over the rendered output.

Q5Is exploitation threshold high? (Auth/Config)

βš–οΈ **Threshold**: Low. CVSS indicates **Low Complexity** and **No Privileges Required** for attack vector.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exp?**: No PoCs listed in the data. πŸ“œ **References**: Official GitHub Security Advisory (GHSA-9832-f8jx-hw6f) and commit fix are available, but no wild exploitation code is public yet.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for Project AIRI v0.7.2-beta.2. πŸ§ͺ **Test**: Inspect `MarkdownRenderer.vue` for unsafe `v-html` usage. Look for unvalidated `command`/`args` parameters in the source code.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. πŸ› οΈ **Patch**: A fix commit exists (3315634903c9102a19e8f0476970df01801c8ca4). Update to the patched version immediately.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If patching isn't possible, **disable** the `MarkdownRenderer.vue` component or strictly sanitize all HTML inputs. 🚫 **Block**: Prevent untrusted users from triggering markdown rendering.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: HIGH. CVSS Score is **Critical** (H:H:H). πŸš€ **Action**: Prioritize patching to prevent arbitrary code execution and XSS attacks immediately.