Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Steipete
Steipete summarize |
|
| Vendors & Products |
Steipete
Steipete summarize |
Mon, 11 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Summarize versions through 0.14.1, fixed in commit 0cfb0fb, creates the daemon configuration directory and file with default filesystem permissions that may be world-readable on Unix-like systems, allowing local attackers to read bearer tokens and API credentials stored in ~/.summarize/daemon.json. A local attacker can exploit these permissive permissions to read the daemon bearer token and persisted provider credentials, enabling unauthorized access to the daemon or recovery of sensitive API keys. | |
| Title | Summarize Insecure Daemon Configuration File Permissions | |
| Weaknesses | CWE-732 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-11T19:17:42.927Z
Reserved: 2026-05-11T14:14:49.611Z
Link: CVE-2026-45222
Updated: 2026-05-11T19:17:31.897Z
Status : Deferred
Published: 2026-05-11T19:16:27.313
Modified: 2026-05-13T15:30:24.603
Link: CVE-2026-45222
No data.
OpenCVE Enrichment
Updated: 2026-05-12T09:22:40Z