Home

Description

Summarize versions through 0.14.1, fixed in commit 0cfb0fb, creates the daemon configuration directory and file with default filesystem permissions that may be world-readable on Unix-like systems, allowing local attackers to read bearer tokens and API credentials stored in ~/.summarize/daemon.json. A local attacker can exploit these permissive permissions to read the daemon bearer token and persisted provider credentials, enabling unauthorized access to the daemon or recovery of sensitive API keys.

PUBLISHED Reserved 2026-05-11 | Published 2026-05-11 | Updated 2026-05-11 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N

MEDIUM: 6.1CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

Problem types

Incorrect Permission Assignment for Critical Resource

Product status

Default status
affected

Any version
affected

0cfb0fb99777a87a7b02082b5e4bd449f8dd6175 (git)
unaffected

Credits

Chia Min Jun Lennon finder

References

github.com/steipete/summarize/pull/214 exploit

github.com/steipete/summarize/pull/214 issue-tracking

github.com/...ommit/0cfb0fb99777a87a7b02082b5e4bd449f8dd6175 patch

www.vulncheck.com/...e-daemon-configuration-file-permissions third-party-advisory

cve.org (CVE-2026-45222)

nvd.nist.gov (CVE-2026-45222)

Download JSON