CVE-2025-29509
📋 TL;DR
CVE-2025-29509 is a remote code execution vulnerability in Jan AI desktop application versions 0.5.14 and earlier. Attackers can exploit this by tricking users into clicking malicious links in conversations, which allows arbitrary code execution through the exposed Electron API. All users of vulnerable Jan versions are affected.
💻 Affected Systems
- Jan AI Desktop Application
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control of the user's machine, data theft, ransomware deployment, and lateral movement within networks.
Likely Case
Malware installation, credential theft, and unauthorized access to local files and system resources.
If Mitigated
Limited impact with proper network segmentation, endpoint protection, and user awareness preventing successful exploitation.
🎯 Exploit Status
Exploitation requires social engineering to trick users into clicking malicious links. Public proof-of-concept code is available in the provided references.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v0.5.15 or later
Vendor Advisory: https://github.com/janhq/jan
Restart Required: Yes
Instructions:
1. Download latest version from official Jan repository. 2. Uninstall old version. 3. Install new version. 4. Restart system.
🔧 Temporary Workarounds
Disable link rendering
allPrevent Jan from rendering clickable links in conversations
Network filtering
allBlock external URL access from Jan application
🧯 If You Can't Patch
- Discontinue use of Jan until patched
- Implement application whitelisting to prevent unauthorized code execution
🔍 How to Verify
Check if Vulnerable:
Check Jan version in application settings or via 'jan --version' command
Check Version:
jan --version
Verify Fix Applied:
Confirm version is v0.5.15 or later and test that clicking malicious links no longer executes code
📡 Detection & Monitoring
Log Indicators:
- Unusual process spawns from Jan process
- shell.openExternal() calls with suspicious URLs
Network Indicators:
- Jan process making unexpected external connections
SIEM Query:
process_name:jan AND (process_spawn:* OR network_connection:* WHERE destination_ip NOT IN allowed_ips)