CVE-2026-45245: Hover Summary Feature Exposes Authenticated Requests
The National Vulnerability Database has detailed CVE-2026-45245, a high-severity vulnerability (CVSS 7.4) affecting the hover summary feature in a product prior to version 0.15.1. This flaw allows malicious web pages to dispatch synthetic mouseover events over attacker-controlled links. The extension then makes authenticated daemon requests using stored tokens without proper event trustworthiness verification.
This vulnerability, categorized under CWE-918 (Server-Side Request Forgery) and CWE-940 (Improper Neutralization of Leading Truncation Characters), essentially creates an authenticated Server-Side Request Forgery (SSRF). Attackers can embed local or private-network URLs behind these hoverable links. When a user interacts with attacker-controlled content, the daemon routes authenticated requests to internal endpoints, potentially exposing sensitive internal systems and data.
This isn’t just a theoretical bypass; it’s a direct route into an organization’s internal network if a user is tricked into hovering over a malicious link. The attacker doesn’t need to steal credentials; they leverage existing authenticated sessions, turning the user’s browser into a proxy for internal network reconnaissance and potential data exfiltration. This is a critical blind spot many defenders overlook.
What This Means For You
- If your organization uses any software with a hover summary feature, especially if it handles authenticated daemon requests, you need to identify its version immediately. This vulnerability allows for authenticated SSRF, bypassing network segmentation by using the user's browser as a pivot point. Audit all web extensions and ensure they are updated to the latest versions. Assume any unpatched instance is a potential internal proxy for attackers.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-45245: Authenticated Daemon Request via Synthetic Mouseover
title: CVE-2026-45245: Authenticated Daemon Request via Synthetic Mouseover
id: scw-2026-05-18-ai-1
status: experimental
level: high
description: |
Detects attempts to exploit CVE-2026-45245 by observing web server requests to the daemon API endpoint, originating from a malicious domain, which is indicative of synthetic mouseover events dispatching authenticated requests without proper verification.
author: SCW Feed Engine (AI-generated)
date: 2026-05-18
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-45245/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/api/v1/daemon'
referer|contains:
- 'attacker.com'
cs-method:
- 'POST'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-45245 | SSRF | Summarize prior to 0.15.1 |
| CVE-2026-45245 | Auth Bypass | hover summary feature allows dispatching synthetic mouseover events over attacker-controlled links |
| CVE-2026-45245 | Information Disclosure | extension makes authenticated daemon requests using stored tokens without verifying event trustworthiness |
| CVE-2026-45245 | SSRF | attackers can place local or private-network URLs behind hoverable links to route authenticated requests through the daemon |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 18, 2026 at 23:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.