CVE-2025-46553: CWE-693: Protection Mechanism Failure in misskey-dev summaly
@misskey-dev/summaly is a tool for getting a summary of a web page. Starting in version 3.0.1 and prior to version 5.2.1, a logic error in the main `summaly` function causes the `allowRedirects` option to never be passed to any plugins, and as a result, isn't enforced. Misskey will follow redirects, despite explicitly requesting not to. Version 5.2.1 contains a patch for the issue.
AI Analysis
Technical Summary
CVE-2025-46553 is a security vulnerability identified in the misskey-dev project's summaly tool, which is used to generate summaries of web pages. The vulnerability exists in versions starting from 3.0.1 up to, but not including, 5.2.1. The core issue is a logic error in the main summaly function where the 'allowRedirects' option is never passed to any plugins. This results in the option not being enforced, causing the tool to follow HTTP redirects even when explicitly configured not to. This behavior constitutes a protection mechanism failure (CWE-693) and relates to improper handling of redirects (CWE-601), as well as potential issues with resource management (CWE-665) and improper input validation (CWE-669). The vulnerability is classified as low severity with a CVSS 4.0 score of 2.1, indicating limited impact and ease of exploitation. Exploitation does not require privileges or authentication but does require user interaction. The vulnerability could allow an attacker to redirect the summaly tool to unintended URLs, potentially leading to information disclosure or facilitating phishing or other social engineering attacks if the summary content is trusted. The issue was patched in version 5.2.1 of summaly. No known exploits are currently reported in the wild.
Potential Impact
For European organizations, the impact of this vulnerability is generally low but context-dependent. Organizations using the summaly tool within their web services or internal tools may inadvertently process redirects they intended to block, potentially exposing users to malicious content or phishing sites through manipulated summaries. This could undermine user trust and lead to indirect reputational damage. Since the vulnerability does not allow direct code execution or privilege escalation, the confidentiality, integrity, and availability impacts are limited. However, in sectors where web content summarization is integrated into critical workflows (e.g., media, research, or intelligence gathering), the failure to enforce redirect restrictions could be exploited to mislead users or automate the retrieval of unintended content. The requirement for user interaction and the low CVSS score suggest that the threat is not severe but should be addressed to maintain robust security hygiene.
Mitigation Recommendations
European organizations should upgrade all instances of the summaly tool to version 5.2.1 or later, where the vulnerability is patched. Until upgrades are completed, organizations should implement strict input validation and sanitization on URLs processed by summaly to detect and block unexpected redirects manually. Additionally, monitoring and logging of HTTP requests and redirects within summaly can help detect anomalous behavior. Organizations should also review their use of summaly in workflows to ensure that summaries are not blindly trusted, especially when sourced from external or untrusted web pages. Employing web content security policies and user awareness training to recognize potential phishing attempts can further reduce risk. Finally, consider isolating summaly processing environments to limit potential impact from malicious redirects.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-46553: CWE-693: Protection Mechanism Failure in misskey-dev summaly
Description
@misskey-dev/summaly is a tool for getting a summary of a web page. Starting in version 3.0.1 and prior to version 5.2.1, a logic error in the main `summaly` function causes the `allowRedirects` option to never be passed to any plugins, and as a result, isn't enforced. Misskey will follow redirects, despite explicitly requesting not to. Version 5.2.1 contains a patch for the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-46553 is a security vulnerability identified in the misskey-dev project's summaly tool, which is used to generate summaries of web pages. The vulnerability exists in versions starting from 3.0.1 up to, but not including, 5.2.1. The core issue is a logic error in the main summaly function where the 'allowRedirects' option is never passed to any plugins. This results in the option not being enforced, causing the tool to follow HTTP redirects even when explicitly configured not to. This behavior constitutes a protection mechanism failure (CWE-693) and relates to improper handling of redirects (CWE-601), as well as potential issues with resource management (CWE-665) and improper input validation (CWE-669). The vulnerability is classified as low severity with a CVSS 4.0 score of 2.1, indicating limited impact and ease of exploitation. Exploitation does not require privileges or authentication but does require user interaction. The vulnerability could allow an attacker to redirect the summaly tool to unintended URLs, potentially leading to information disclosure or facilitating phishing or other social engineering attacks if the summary content is trusted. The issue was patched in version 5.2.1 of summaly. No known exploits are currently reported in the wild.
Potential Impact
For European organizations, the impact of this vulnerability is generally low but context-dependent. Organizations using the summaly tool within their web services or internal tools may inadvertently process redirects they intended to block, potentially exposing users to malicious content or phishing sites through manipulated summaries. This could undermine user trust and lead to indirect reputational damage. Since the vulnerability does not allow direct code execution or privilege escalation, the confidentiality, integrity, and availability impacts are limited. However, in sectors where web content summarization is integrated into critical workflows (e.g., media, research, or intelligence gathering), the failure to enforce redirect restrictions could be exploited to mislead users or automate the retrieval of unintended content. The requirement for user interaction and the low CVSS score suggest that the threat is not severe but should be addressed to maintain robust security hygiene.
Mitigation Recommendations
European organizations should upgrade all instances of the summaly tool to version 5.2.1 or later, where the vulnerability is patched. Until upgrades are completed, organizations should implement strict input validation and sanitization on URLs processed by summaly to detect and block unexpected redirects manually. Additionally, monitoring and logging of HTTP requests and redirects within summaly can help detect anomalous behavior. Organizations should also review their use of summaly in workflows to ensure that summaries are not blindly trusted, especially when sourced from external or untrusted web pages. Employing web content security policies and user awareness training to recognize potential phishing attempts can further reduce risk. Finally, consider isolating summaly processing environments to limit potential impact from malicious redirects.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-24T21:10:48.173Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d981dc4522896dcbdaed9
Added to database: 5/21/2025, 9:08:45 AM
Last enriched: 7/6/2025, 8:26:38 PM
Last updated: 11/22/2025, 7:06:58 AM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11186: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in humanityco Cookie Notice & Compliance for GDPR / CCPA
MediumCVE-2025-2609: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in MagnusSolution MagnusBilling
HighCVE-2024-9643: CWE-489 Active Debug Code in Four-Faith F3x36
CriticalCVE-2025-65947: CWE-400: Uncontrolled Resource Consumption in jzeuzs thread-amount
HighCVE-2025-65946: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in RooCodeInc Roo-Code
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.