Cross-Site Scripting and Command Execution Flaws in AIRI by Moeru AI
CVE-2025-59053

9.7CRITICAL

Key Information:

Vendor

Moeru-ai

Status
Vendor
CVE Published:
11 September 2025

What is CVE-2025-59053?

AIRI, developed by Moeru AI, is susceptible to a vulnerability in its Markdown renderer that enables attackers to inject and execute malicious scripts. The flaw arises from the improper handling of Markdown content via the useMarkdown composable, which renders HTML directly into the DOM using v-html without appropriate sanitization. This can lead to cross-site scripting (XSS) attacks. Additionally, the MCP plugin exposes a command execution interface that allows for arbitrary command execution without input validation. Attackers can exploit the XSS vulnerability to execute commands on the server, broadening the threat surface significantly. This vulnerability has been addressed in version v0.7.2-beta.3.

Affected Version(s)

airi = 0.7.2-beta.2

References

CVSS V3.1

Score:
9.7
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-59053 : Cross-Site Scripting and Command Execution Flaws in AIRI by Moeru AI