Skip to main content

CVE-2025-46553: CWE-693: Protection Mechanism Failure in misskey-dev summaly

Low
Published: Mon May 05 2025 (05/05/2025, 18:28:50 UTC)
Source: CVE
Vendor/Project: misskey-dev
Product: summaly

Description

@misskey-dev/summaly is a tool for getting a summary of a web page. Starting in version 3.0.1 and prior to version 5.2.1, a logic error in the main `summaly` function causes the `allowRedirects` option to never be passed to any plugins, and as a result, isn't enforced. Misskey will follow redirects, despite explicitly requesting not to. Version 5.2.1 contains a patch for the issue.

AI-Powered Analysis

AILast updated: 07/06/2025, 20:26:38 UTC

Technical Analysis

CVE-2025-46553 is a security vulnerability identified in the misskey-dev project's summaly tool, which is used to generate summaries of web pages. The vulnerability exists in versions starting from 3.0.1 up to, but not including, 5.2.1. The core issue is a logic error in the main summaly function where the 'allowRedirects' option is never passed to any plugins. This results in the option not being enforced, causing the tool to follow HTTP redirects even when explicitly configured not to. This behavior constitutes a protection mechanism failure (CWE-693) and relates to improper handling of redirects (CWE-601), as well as potential issues with resource management (CWE-665) and improper input validation (CWE-669). The vulnerability is classified as low severity with a CVSS 4.0 score of 2.1, indicating limited impact and ease of exploitation. Exploitation does not require privileges or authentication but does require user interaction. The vulnerability could allow an attacker to redirect the summaly tool to unintended URLs, potentially leading to information disclosure or facilitating phishing or other social engineering attacks if the summary content is trusted. The issue was patched in version 5.2.1 of summaly. No known exploits are currently reported in the wild.

Potential Impact

For European organizations, the impact of this vulnerability is generally low but context-dependent. Organizations using the summaly tool within their web services or internal tools may inadvertently process redirects they intended to block, potentially exposing users to malicious content or phishing sites through manipulated summaries. This could undermine user trust and lead to indirect reputational damage. Since the vulnerability does not allow direct code execution or privilege escalation, the confidentiality, integrity, and availability impacts are limited. However, in sectors where web content summarization is integrated into critical workflows (e.g., media, research, or intelligence gathering), the failure to enforce redirect restrictions could be exploited to mislead users or automate the retrieval of unintended content. The requirement for user interaction and the low CVSS score suggest that the threat is not severe but should be addressed to maintain robust security hygiene.

Mitigation Recommendations

European organizations should upgrade all instances of the summaly tool to version 5.2.1 or later, where the vulnerability is patched. Until upgrades are completed, organizations should implement strict input validation and sanitization on URLs processed by summaly to detect and block unexpected redirects manually. Additionally, monitoring and logging of HTTP requests and redirects within summaly can help detect anomalous behavior. Organizations should also review their use of summaly in workflows to ensure that summaries are not blindly trusted, especially when sourced from external or untrusted web pages. Employing web content security policies and user awareness training to recognize potential phishing attempts can further reduce risk. Finally, consider isolating summaly processing environments to limit potential impact from malicious redirects.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-04-24T21:10:48.173Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdaed9

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/6/2025, 8:26:38 PM

Last updated: 8/11/2025, 4:39:16 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats