Summarize prior to 0.15.1 contains an insecure file permission vulnerability in the refresh-free configuration rewrite path that allows local users to read sensitive credentials by exploiting default filesystem permissions. When the refresh-free path rewrites the configuration file, it creates the replacement with default process umask permissions instead of preserving the original file permissions, exposing the config file containing API keys and provider credentials to other local users on shared Unix-like systems.
History

Tue, 19 May 2026 01:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:steipete:summarize:*:*:*:*:*:*:*:*

Mon, 18 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 18 May 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Steipete
Steipete summarize
Vendors & Products Steipete
Steipete summarize

Mon, 18 May 2026 19:30:00 +0000

Type Values Removed Values Added
Description Summarize prior to 0.15.1 contains an insecure file permission vulnerability in the refresh-free configuration rewrite path that allows local users to read sensitive credentials by exploiting default filesystem permissions. When the refresh-free path rewrites the configuration file, it creates the replacement with default process umask permissions instead of preserving the original file permissions, exposing the config file containing API keys and provider credentials to other local users on shared Unix-like systems.
Title Summarize < 0.15.1 Insecure File Permissions Information Disclosure
Weaknesses CWE-732
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2026-05-18T19:03:34.753Z

Updated: 2026-05-18T21:28:41.957Z

Reserved: 2026-05-11T14:14:49.613Z

Link: CVE-2026-45246

cve-icon Vulnrichment

Updated: 2026-05-18T21:27:33.727Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-18T20:16:38.823

Modified: 2026-05-19T01:34:55.510

Link: CVE-2026-45246

cve-icon Redhat

No data.