<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Summarize &lt; 0.15.1 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/summarize--0.15.1/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 20:18:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/summarize--0.15.1/feed.xml" rel="self" type="application/rss+xml"/><item><title>Summarize Extension Mouseover Authenticated Request Vulnerability (CVE-2026-45245)</title><link>https://feed.craftedsignal.io/briefs/2026-05-summarize-mouseover-rce/</link><pubDate>Mon, 18 May 2026 20:18:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-summarize-mouseover-rce/</guid><description>Summarize versions prior to 0.15.1 contain a vulnerability (CVE-2026-45245) in the hover summary feature that allows malicious pages to dispatch synthetic mouseover events, triggering authenticated daemon requests and potentially exposing sensitive internal endpoints.</description><content:encoded><![CDATA[<p>Summarize, a browser extension, is vulnerable to an authenticated request forgery via synthetic mouseover events. Prior to version 0.15.1, the extension&rsquo;s hover summary feature fails to validate the trustworthiness of mouseover events. This allows a malicious webpage to dispatch synthetic events over attacker-controlled links. Consequently, the extension makes authenticated daemon requests using stored tokens, potentially routing these requests to local or private-network URLs. This vulnerability, identified as CVE-2026-45245, could enable attackers to access sensitive internal endpoints when users interact with malicious content through the extension.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious webpage containing attacker-controlled links.</li>
<li>The malicious webpage uses JavaScript to dispatch synthetic <code>mouseover</code> events targeting the attacker-controlled links.</li>
<li>The Summarize extension&rsquo;s hover summary feature processes the synthetic <code>mouseover</code> event without proper validation.</li>
<li>The extension generates an authenticated request to the daemon, based on the link targeted by the <code>mouseover</code> event.</li>
<li>The attacker-controlled link points to a local or private network URL.</li>
<li>The extension routes the authenticated request to the specified local or private network URL.</li>
<li>If the local or private network URL corresponds to an internal endpoint without proper authorization checks, the attacker may gain unauthorized access.</li>
<li>Successful exploitation allows the attacker to read sensitive information from the internal endpoint.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-45245 can allow attackers to access sensitive internal endpoints through a user&rsquo;s Summarize extension. By placing local or private-network URLs behind hoverable links, attackers can route authenticated requests through the daemon, bypassing network security measures. The impact includes unauthorized access to internal resources and potential data exfiltration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Summarize extension to version 0.15.1 or later to remediate CVE-2026-45245.</li>
<li>Deploy the Sigma rule &ldquo;Detect Summarize Extension Synthetic Mouseover Event&rdquo; to identify potential exploitation attempts.</li>
<li>Educate users about the risks of interacting with untrusted webpages and the potential for malicious mouseover events.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-45245</category><category>browser-extension</category><category>authenticated-request-forgery</category><category>mouseover-event</category></item><item><title>Summarize Path Traversal Vulnerability (CVE-2026-45242)</title><link>https://feed.craftedsignal.io/briefs/2026-05-summarize-path-traversal/</link><pubDate>Mon, 18 May 2026 19:18:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-summarize-path-traversal/</guid><description>Summarize versions prior to 0.15.1 are vulnerable to path traversal in the /v1/summarize daemon endpoint, allowing authenticated callers to write files to arbitrary directories via the slidesDir request parameter and subsequently delete files.</description><content:encoded><![CDATA[<p>Summarize versions prior to 0.15.1 are susceptible to a path traversal vulnerability in the <code>/v1/summarize</code> daemon endpoint. This flaw allows authenticated users to write arbitrary files to any directory on the system where the Summarize application has write permissions. The vulnerability is triggered by manipulating the <code>slidesDir</code> request parameter, enabling attackers to inject absolute paths or directory traversal sequences. This can be exploited to write <code>slide_*.png</code> and <code>slides.json</code> files to locations outside of the intended directory and subsequently delete them, potentially leading to denial of service or other unexpected behavior. Defenders should ensure that Summarize is updated to version 0.15.1 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Summarize application.</li>
<li>Attacker crafts a malicious HTTP POST request to the <code>/v1/summarize</code> endpoint.</li>
<li>The request includes a <code>slidesDir</code> parameter containing a path traversal sequence (e.g., <code>../../</code>) or an absolute path pointing to a sensitive directory.</li>
<li>The Summarize application processes the request without proper sanitization of the <code>slidesDir</code> parameter.</li>
<li>The application writes <code>slide_*.png</code> and <code>slides.json</code> files to the attacker-specified location.</li>
<li>The attacker sends a subsequent request to trigger the file deletion functionality, targeting the previously written files.</li>
<li>The Summarize application deletes the files at the specified location, leading to potential data loss or system instability.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows authenticated attackers to write and delete files in arbitrary directories accessible to the Summarize application. This can lead to data corruption, denial of service, or potentially arbitrary code execution if combined with other vulnerabilities or misconfigurations. The NVD rates this vulnerability with a CVSS v3.1 base score of 7.1, indicating a high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Summarize to version 0.15.1 or later to remediate CVE-2026-45242.</li>
<li>Deploy the Sigma rule &ldquo;Detect Summarize Path Traversal Attempt via slidesDir&rdquo; to identify potential exploitation attempts by monitoring HTTP requests to the <code>/v1/summarize</code> endpoint.</li>
<li>Implement input validation and sanitization on the <code>slidesDir</code> parameter to prevent path traversal attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>web-application</category></item></channel></rss>