Summarize Extension Mouseover Authenticated Request Vulnerability (CVE-2026-45245)
Summarize versions prior to 0.15.1 contain a vulnerability (CVE-2026-45245) in the hover summary feature that allows malicious pages to dispatch synthetic mouseover events, triggering authenticated daemon requests and potentially exposing sensitive internal endpoints.
Summarize, a browser extension, is vulnerable to an authenticated request forgery via synthetic mouseover events. Prior to version 0.15.1, the extension’s hover summary feature fails to validate the trustworthiness of mouseover events. This allows a malicious webpage to dispatch synthetic events over attacker-controlled links. Consequently, the extension makes authenticated daemon requests using stored tokens, potentially routing these requests to local or private-network URLs. This vulnerability, identified as CVE-2026-45245, could enable attackers to access sensitive internal endpoints when users interact with malicious content through the extension.
Attack Chain
- Attacker crafts a malicious webpage containing attacker-controlled links.
- The malicious webpage uses JavaScript to dispatch synthetic
mouseoverevents targeting the attacker-controlled links. - The Summarize extension’s hover summary feature processes the synthetic
mouseoverevent without proper validation. - The extension generates an authenticated request to the daemon, based on the link targeted by the
mouseoverevent. - The attacker-controlled link points to a local or private network URL.
- The extension routes the authenticated request to the specified local or private network URL.
- If the local or private network URL corresponds to an internal endpoint without proper authorization checks, the attacker may gain unauthorized access.
- Successful exploitation allows the attacker to read sensitive information from the internal endpoint.
Impact
Successful exploitation of CVE-2026-45245 can allow attackers to access sensitive internal endpoints through a user’s Summarize extension. By placing local or private-network URLs behind hoverable links, attackers can route authenticated requests through the daemon, bypassing network security measures. The impact includes unauthorized access to internal resources and potential data exfiltration.
Recommendation
- Upgrade the Summarize extension to version 0.15.1 or later to remediate CVE-2026-45245.
- Deploy the Sigma rule “Detect Summarize Extension Synthetic Mouseover Event” to identify potential exploitation attempts.
- Educate users about the risks of interacting with untrusted webpages and the potential for malicious mouseover events.
Detection coverage 2
Detect Summarize Extension Synthetic Mouseover Event
mediumDetects CVE-2026-45245 exploitation — potential synthetic mouseover events targeting local or private network addresses, indicating an attempt to exploit the Summarize extension vulnerability.
Detect Summarize Extension Local File Access
highDetects CVE-2026-45245 exploitation — potential local file access attempts through Summarize extension by monitoring requests containing file:// scheme.
Detection queries are available on the platform. Get full rules →