Description
Summarize prior to 0.15.1 contains a path traversal vulnerability in the /v1/summarize daemon endpoint that allows authenticated callers to write files to arbitrary directories by supplying an absolute path or directory traversal sequence in the slidesDir request parameter. Attackers can exploit this to write slide_*.png and slides.json files to any writable directory and subsequently delete matching files at the specified location through repeat extraction.
Published: 2026-05-18
Score: 7.1 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a path traversal flaw in the /v1/summarize daemon endpoint of the Summarize project. An authenticated caller can supply an absolute path or a traversal sequence in the slidesDir request parameter, which causes the service to write slide_*.png and slides.json files to any writable directory. The attacker can also later delete files matching the specified location through repeated extraction. This results in unauthorized data modification and potential loss of data integrity, and may allow an attacker to place arbitrary files that could be used for further compromise.

Affected Systems

The affected vendor is steipete:summarize. Any installation of Summarize with a version prior to 0.15.1 is vulnerable. Detailed affected versions are implied as all releases before 0.15.1, as the patch was released in version 0.15.2.

Risk and Exploitability

The CVSS score of 7.1 indicates a high severity vulnerability. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting no currently known widespread exploitation. Attackers must be authenticated to the /v1/summarize endpoint, but once authenticated they can supply arbitrary path components, which gives them the ability to write and later delete files in any directory the service can reach. The lack of proper path sanitization is a classic missing authorization weakness (CWE-862).

Generated by OpenCVE AI on May 18, 2026 at 20:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Summarize to version 0.15.2 or newer, which patches the path traversal vulnerability.
  • Verify that the application enforces authentication for the /v1/summarize endpoint and that only authorized users can access it.
  • Implement input validation to ensure that the slidesDir parameter accepts only allowed directory names and disallows absolute paths or path traversal sequences.

Generated by OpenCVE AI on May 18, 2026 at 20:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 18 May 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Steipete
Steipete summarize
Vendors & Products Steipete
Steipete summarize

Mon, 18 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 18 May 2026 19:00:00 +0000

Type Values Removed Values Added
Description Summarize prior to 0.15.1 contains a path traversal vulnerability in the /v1/summarize daemon endpoint that allows authenticated callers to write files to arbitrary directories by supplying an absolute path or directory traversal sequence in the slidesDir request parameter. Attackers can exploit this to write slide_*.png and slides.json files to any writable directory and subsequently delete matching files at the specified location through repeat extraction.
Title Summarize < 0.15.1 Path Traversal via slidesDir Parameter
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Steipete Summarize
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-18T19:09:46.659Z

Reserved: 2026-05-11T14:14:49.613Z

Link: CVE-2026-45242

cve-icon Vulnrichment

Updated: 2026-05-18T19:09:43.149Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-18T19:16:28.240

Modified: 2026-05-18T20:16:38.240

Link: CVE-2026-45242

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-18T20:30:05Z

Weaknesses