CVE-2025-46553: CWE-693: Protection Mechanism Failure in misskey-dev summaly
@misskey-dev/summaly is a tool for getting a summary of a web page. Starting in version 3.0.1 and prior to version 5.2.1, a logic error in the main `summaly` function causes the `allowRedirects` option to never be passed to any plugins, and as a result, isn't enforced. Misskey will follow redirects, despite explicitly requesting not to. Version 5.2.1 contains a patch for the issue.
AI Analysis
Technical Summary
CVE-2025-46553 is a security vulnerability identified in the misskey-dev project's summaly tool, which is used to generate summaries of web pages. The vulnerability exists in versions starting from 3.0.1 up to, but not including, 5.2.1. The core issue is a logic error in the main summaly function where the 'allowRedirects' option is never passed to any plugins. This results in the option not being enforced, causing the tool to follow HTTP redirects even when explicitly configured not to. This behavior constitutes a protection mechanism failure (CWE-693) and relates to improper handling of redirects (CWE-601), as well as potential issues with resource management (CWE-665) and improper input validation (CWE-669). The vulnerability is classified as low severity with a CVSS 4.0 score of 2.1, indicating limited impact and ease of exploitation. Exploitation does not require privileges or authentication but does require user interaction. The vulnerability could allow an attacker to redirect the summaly tool to unintended URLs, potentially leading to information disclosure or facilitating phishing or other social engineering attacks if the summary content is trusted. The issue was patched in version 5.2.1 of summaly. No known exploits are currently reported in the wild.
Potential Impact
For European organizations, the impact of this vulnerability is generally low but context-dependent. Organizations using the summaly tool within their web services or internal tools may inadvertently process redirects they intended to block, potentially exposing users to malicious content or phishing sites through manipulated summaries. This could undermine user trust and lead to indirect reputational damage. Since the vulnerability does not allow direct code execution or privilege escalation, the confidentiality, integrity, and availability impacts are limited. However, in sectors where web content summarization is integrated into critical workflows (e.g., media, research, or intelligence gathering), the failure to enforce redirect restrictions could be exploited to mislead users or automate the retrieval of unintended content. The requirement for user interaction and the low CVSS score suggest that the threat is not severe but should be addressed to maintain robust security hygiene.
Mitigation Recommendations
European organizations should upgrade all instances of the summaly tool to version 5.2.1 or later, where the vulnerability is patched. Until upgrades are completed, organizations should implement strict input validation and sanitization on URLs processed by summaly to detect and block unexpected redirects manually. Additionally, monitoring and logging of HTTP requests and redirects within summaly can help detect anomalous behavior. Organizations should also review their use of summaly in workflows to ensure that summaries are not blindly trusted, especially when sourced from external or untrusted web pages. Employing web content security policies and user awareness training to recognize potential phishing attempts can further reduce risk. Finally, consider isolating summaly processing environments to limit potential impact from malicious redirects.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-46553: CWE-693: Protection Mechanism Failure in misskey-dev summaly
Description
@misskey-dev/summaly is a tool for getting a summary of a web page. Starting in version 3.0.1 and prior to version 5.2.1, a logic error in the main `summaly` function causes the `allowRedirects` option to never be passed to any plugins, and as a result, isn't enforced. Misskey will follow redirects, despite explicitly requesting not to. Version 5.2.1 contains a patch for the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-46553 is a security vulnerability identified in the misskey-dev project's summaly tool, which is used to generate summaries of web pages. The vulnerability exists in versions starting from 3.0.1 up to, but not including, 5.2.1. The core issue is a logic error in the main summaly function where the 'allowRedirects' option is never passed to any plugins. This results in the option not being enforced, causing the tool to follow HTTP redirects even when explicitly configured not to. This behavior constitutes a protection mechanism failure (CWE-693) and relates to improper handling of redirects (CWE-601), as well as potential issues with resource management (CWE-665) and improper input validation (CWE-669). The vulnerability is classified as low severity with a CVSS 4.0 score of 2.1, indicating limited impact and ease of exploitation. Exploitation does not require privileges or authentication but does require user interaction. The vulnerability could allow an attacker to redirect the summaly tool to unintended URLs, potentially leading to information disclosure or facilitating phishing or other social engineering attacks if the summary content is trusted. The issue was patched in version 5.2.1 of summaly. No known exploits are currently reported in the wild.
Potential Impact
For European organizations, the impact of this vulnerability is generally low but context-dependent. Organizations using the summaly tool within their web services or internal tools may inadvertently process redirects they intended to block, potentially exposing users to malicious content or phishing sites through manipulated summaries. This could undermine user trust and lead to indirect reputational damage. Since the vulnerability does not allow direct code execution or privilege escalation, the confidentiality, integrity, and availability impacts are limited. However, in sectors where web content summarization is integrated into critical workflows (e.g., media, research, or intelligence gathering), the failure to enforce redirect restrictions could be exploited to mislead users or automate the retrieval of unintended content. The requirement for user interaction and the low CVSS score suggest that the threat is not severe but should be addressed to maintain robust security hygiene.
Mitigation Recommendations
European organizations should upgrade all instances of the summaly tool to version 5.2.1 or later, where the vulnerability is patched. Until upgrades are completed, organizations should implement strict input validation and sanitization on URLs processed by summaly to detect and block unexpected redirects manually. Additionally, monitoring and logging of HTTP requests and redirects within summaly can help detect anomalous behavior. Organizations should also review their use of summaly in workflows to ensure that summaries are not blindly trusted, especially when sourced from external or untrusted web pages. Employing web content security policies and user awareness training to recognize potential phishing attempts can further reduce risk. Finally, consider isolating summaly processing environments to limit potential impact from malicious redirects.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-24T21:10:48.173Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d981dc4522896dcbdaed9
Added to database: 5/21/2025, 9:08:45 AM
Last enriched: 7/6/2025, 8:26:38 PM
Last updated: 1/7/2026, 6:12:21 AM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.