CVE-2025-29509

8.8 HIGH

📋 TL;DR

CVE-2025-29509 is a remote code execution vulnerability in Jan AI desktop application versions 0.5.14 and earlier. Attackers can exploit this by tricking users into clicking malicious links in conversations, which allows arbitrary code execution through the exposed Electron API. All users of vulnerable Jan versions are affected.

💻 Affected Systems

Products:
  • Jan AI Desktop Application
Versions: v0.5.14 and earlier
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The vulnerability requires user interaction (clicking a link).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the user's machine, data theft, ransomware deployment, and lateral movement within networks.

🟠

Likely Case

Malware installation, credential theft, and unauthorized access to local files and system resources.

🟢

If Mitigated

Limited impact with proper network segmentation, endpoint protection, and user awareness preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering to trick users into clicking malicious links. Public proof-of-concept code is available in the provided references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v0.5.15 or later

Vendor Advisory: https://github.com/janhq/jan

Restart Required: Yes

Instructions:

1. Download latest version from official Jan repository. 2. Uninstall old version. 3. Install new version. 4. Restart system.

🔧 Temporary Workarounds

Disable link rendering

all

Prevent Jan from rendering clickable links in conversations

Network filtering

all

Block external URL access from Jan application

🧯 If You Can't Patch

  • Discontinue use of Jan until patched
  • Implement application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check Jan version in application settings or via 'jan --version' command

Check Version:

jan --version

Verify Fix Applied:

Confirm version is v0.5.15 or later and test that clicking malicious links no longer executes code

📡 Detection & Monitoring

Log Indicators:

  • Unusual process spawns from Jan process
  • shell.openExternal() calls with suspicious URLs

Network Indicators:

  • Jan process making unexpected external connections

SIEM Query:

process_name:jan AND (process_spawn:* OR network_connection:* WHERE destination_ip NOT IN allowed_ips)

🔗 References

📤 Share & Export