Home

Description

Summarize prior to 0.15.1 contains a vulnerability in the hover summary feature that allows malicious pages to dispatch synthetic mouseover events over attacker-controlled links, causing the extension to make authenticated daemon requests using stored tokens without verifying event trustworthiness. Attackers can place local or private-network URLs behind hoverable links to route authenticated requests through the daemon, potentially accessing sensitive internal endpoints when users interact with attacker-controlled content.

PUBLISHED Reserved 2026-05-11 | Published 2026-05-18 | Updated 2026-05-18 | Assigner VulnCheck




MEDIUM: 4.6CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N

HIGH: 7.4CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

Problem types

Server-Side Request Forgery (SSRF)

Improper Verification of Source of a Communication Channel

Product status

Default status
affected

Any version before 0.15.1
affected

ecbb2c414255aa480a15d0d8b205224c14cfdbcb (git)
unaffected

Credits

Chia Min Jun Lennon finder

References

github.com/steipete/summarize/pull/218 exploit

github.com/steipete/summarize/releases/tag/v0.15.2 release-notes

github.com/steipete/summarize/pull/218 issue-tracking

github.com/...ommit/ecbb2c414255aa480a15d0d8b205224c14cfdbcb patch

www.vulncheck.com/...zed-daemon-request-via-untrusted-events third-party-advisory

cve.org (CVE-2026-45245)

nvd.nist.gov (CVE-2026-45245)

Download JSON