PT-2026-39728 · Steipete · Summarize

Published

2026-05-11

·

Updated

2026-05-11

·

CVE-2026-45222

CVSS v3.1

6.1

Medium

VectorAV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
Summarize versions through 0.14.1, fixed in commit 0cfb0fb, creates the daemon configuration directory and file with default filesystem permissions that may be world-readable on Unix-like systems, allowing local attackers to read bearer tokens and API credentials stored in ~/.summarize/daemon.json. A local attacker can exploit these permissive permissions to read the daemon bearer token and persisted provider credentials, enabling unauthorized access to the daemon or recovery of sensitive API keys.

Fix

Incorrect Permission

Weakness Enumeration

Related Identifiers

CVE-2026-45222

Affected Products

Summarize