<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Summarize — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/summarize/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 20:18:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/summarize/feed.xml" rel="self" type="application/rss+xml"/><item><title>Summarize Extension Mouseover Authenticated Request Vulnerability (CVE-2026-45245)</title><link>https://feed.craftedsignal.io/briefs/2026-05-summarize-mouseover-rce/</link><pubDate>Mon, 18 May 2026 20:18:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-summarize-mouseover-rce/</guid><description>Summarize versions prior to 0.15.1 contain a vulnerability (CVE-2026-45245) in the hover summary feature that allows malicious pages to dispatch synthetic mouseover events, triggering authenticated daemon requests and potentially exposing sensitive internal endpoints.</description><content:encoded><![CDATA[<p>Summarize, a browser extension, is vulnerable to an authenticated request forgery via synthetic mouseover events. Prior to version 0.15.1, the extension&rsquo;s hover summary feature fails to validate the trustworthiness of mouseover events. This allows a malicious webpage to dispatch synthetic events over attacker-controlled links. Consequently, the extension makes authenticated daemon requests using stored tokens, potentially routing these requests to local or private-network URLs. This vulnerability, identified as CVE-2026-45245, could enable attackers to access sensitive internal endpoints when users interact with malicious content through the extension.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious webpage containing attacker-controlled links.</li>
<li>The malicious webpage uses JavaScript to dispatch synthetic <code>mouseover</code> events targeting the attacker-controlled links.</li>
<li>The Summarize extension&rsquo;s hover summary feature processes the synthetic <code>mouseover</code> event without proper validation.</li>
<li>The extension generates an authenticated request to the daemon, based on the link targeted by the <code>mouseover</code> event.</li>
<li>The attacker-controlled link points to a local or private network URL.</li>
<li>The extension routes the authenticated request to the specified local or private network URL.</li>
<li>If the local or private network URL corresponds to an internal endpoint without proper authorization checks, the attacker may gain unauthorized access.</li>
<li>Successful exploitation allows the attacker to read sensitive information from the internal endpoint.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-45245 can allow attackers to access sensitive internal endpoints through a user&rsquo;s Summarize extension. By placing local or private-network URLs behind hoverable links, attackers can route authenticated requests through the daemon, bypassing network security measures. The impact includes unauthorized access to internal resources and potential data exfiltration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Summarize extension to version 0.15.1 or later to remediate CVE-2026-45245.</li>
<li>Deploy the Sigma rule &ldquo;Detect Summarize Extension Synthetic Mouseover Event&rdquo; to identify potential exploitation attempts.</li>
<li>Educate users about the risks of interacting with untrusted webpages and the potential for malicious mouseover events.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-45245</category><category>browser-extension</category><category>authenticated-request-forgery</category><category>mouseover-event</category></item></channel></rss>