Back to VulnFeed / CVE-2026-45222
root@hackertop:~/vulnfeed/CVE-2026-45222#
CVE-2026-45222 MEDIUM CVE ✓ Patched◉ PoC 公开◉ Mitigation Active Lifecycle 5/7

steipete summarize up to 0.14.1 ~/.summarize/daemon.json permission assignment

summarize 9d ago Impact pending confirmation
LIFECYCLE
5.6 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in steipete summarize up to 0.14.1 and classified as problematic. This issue affects an unknown code block of the file ~/.summarize/daemon.json. Applying the patch 0cfb0fb99777a87a7b02082b5e4bd449f8dd6175 is able to eliminate this problem.
Root Cause Analysis
Using CWE to declare the problem leads to CWE-732. The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.

Impact: Impacted is confidentiality, integrity, and availability.

Exploit: By approaching the search of inurl:~/.summarize/daemon.json it is possible to find vulnerable targets with Google Hacking.

Countermeasure: Applying the patch 0cfb0fb99777a87a7b02082b5e4bd449f8dd6175 is able to eliminate this problem.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-45222 · CVSS 5.6 · Patched