Vulnerability Description
Summarize prior to 0.15.1 contains a path traversal vulnerability in the /v1/summarize daemon endpoint that allows authenticated callers to write files to arbitrary directories by supplying an absolute path or directory traversal sequence in the slidesDir request parameter. Attackers can exploit this to write slide_*.png and slides.json files to any writable directory and subsequently delete matching files at the specified location through repeat extraction.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Steipete | Summarize | < 0.15.1 |
Related Weaknesses (CWE)
References
- https://github.com/steipete/summarize/commit/ec8efd63295656fbfe8743620179c489bc5Patch
- https://github.com/steipete/summarize/pull/220ExploitIssue TrackingPatch
- https://github.com/steipete/summarize/releases/tag/v0.15.2Release Notes
- https://www.vulncheck.com/advisories/summarize-path-traversal-via-slidesdir-paraThird Party Advisory
- https://github.com/steipete/summarize/pull/220ExploitIssue TrackingPatch
FAQ
What is CVE-2026-45242?
CVE-2026-45242 is a vulnerability with a CVSS score of 7.1 (HIGH). Summarize prior to 0.15.1 contains a path traversal vulnerability in the /v1/summarize daemon endpoint that allows authenticated callers to write files to arbitrary directories by supplying an absolut...
How severe is CVE-2026-45242?
CVE-2026-45242 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-45242?
Check the references section above for vendor advisories and patch information. Affected products include: Steipete Summarize.