Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SquareX and Perplexity Quarrel Over Alleged Comet Browser Vulnerability

SquareX and Perplexity Quarrel Over Alleged Comet Browser Vulnerability

Posted on November 21, 2025November 21, 2025 By CWS

Browser safety agency SquareX claims to have discovered a doubtlessly crucial vulnerability in Perplexity’s Comet AI browser. Perplexity has taken steps to dam the assault, however has strongly disputed the findings. 

SquareX’s controversial analysis is centered round a limited-documentation Mannequin Context Protocol (MCP) API and two hidden Analytics and Agentic extensions which can be utilized by Comet and can’t be disabled.

MCP is usually used to attach AI functions to exterior information sources and instruments. SquareX discovered that the Agentic extension is designed for executing all of Comet’s agentic automation capabilities, whereas the Analytics extension is designed for amassing and processing browser information and monitoring the actions of the Agentic extension. 

SquareX found that each extensions can solely talk with ‘perplexity.ai’ subdomains and the entry of the API is restricted to those subdomains. 

Nonetheless, based on SquareX, if an attacker can achieve entry to the ‘perplexity.ai’ area or compromise the agentic extension, they will abuse the MCP API to execute instructions on the host gadget with out requesting the person’s permission. This allows the attacker to take management of the sufferer’s gadget and execute ransomware, monitor person exercise, or exfiltrate information, SquareX warned.

The browser safety agency has admitted that to launch an assault, a menace actor would want to hijack an extension by an XSS or MitM community assault, or achieve entry to Perplexity methods to compromise the extension. 

In an assault demonstration, SquareX researchers used a way referred to as ‘extension stomping’, which includes making a malicious extension that impersonates the respectable Comet analytics extension and sideloading it. They confirmed how the assault can be utilized to deploy ransomware. 

SquareX mentioned it reported its findings to Perplexity on November 4, nevertheless it had not obtained any response by the point of disclosure. Commercial. Scroll to proceed studying.

Contacted by SecurityWeek, Perplexity mentioned it did implement some measures to forestall the assault methodology described by SquareX out of an abundance of warning, however described it as “pretend safety analysis”. 

“This complete state of affairs is contrived and doesn’t characterize any precise expertise safety threat,” defined a Perplexity spokesperson. “If it’s a threat in any respect, it’s a threat of people being phished and satisfied to manually load malware, however even they admit that’s unrealistic and it must be a Perplexity worker with manufacturing entry who modifications the present extension for a nasty one.”

Perplexity identified that SquareX’s video demonstration reveals the assault requiring important human intervention.

The browser vendor has additionally disputed claims that Comet doesn’t explicitly get hold of person consent for native system actions. The corporate contends that customers should conform to putting in native MCPs, and any subsequent command from the MCP requires person affirmation.

Perplexity mentioned it’s not conscious of any assaults geared toward Comet customers and identified that it does work with safety researchers to proactively determine and patch potential vulnerabilities. Nonetheless, the corporate mentioned that whereas SquareX did attain out, its bug report couldn’t be accessed, and the safety agency didn’t reply to requests for entry to the vulnerability info. 

In response to Perplexity’s feedback, SquareX identified that whereas the extension stomping approach it utilized in its demonstration does require person interplay, its level was to reveal the permissions and inherent threat of the MCP API. The corporate famous that different assault vectors, corresponding to provide chain compromise, XSS, or MitM assaults, would require much less person interplay.  

SquareX additionally mentioned that in its experiments its researchers had been by no means prompted for permission and that the ransomware was instantly executed after the Comet browser was reopened.

SquareX famous that Perplexity’s patch is “good news from a safety perspective and we’re glad that our analysis might contribute to creating the AI Browser safer”.

Associated: Hackers Goal Perplexity Comet Browser Customers

Associated: LayerX Raises $11 Million for Browser Safety Answer

Associated: AI Sidebar Spoofing Places ChatGPT Atlas, Perplexity Comet and Different Browsers at Threat

Security Week News Tags:Alleged, Browser, Comet, Perplexity, Quarrel, SquareX, Vulnerability

Post navigation

Previous Post: Broadcom Allegedly Breached by Clop Ransomware via E-Business Suite 0-Day Hack
Next Post: Chinese Cyberspies Deploy ‘BadAudio’ Malware via Supply Chain Attacks

Related Posts

Order out of Chaos – Using Chaos Theory Encryption to Protect OT and IoT Order out of Chaos – Using Chaos Theory Encryption to Protect OT and IoT Security Week News
IoT Security Firm Exein Raises  Million  IoT Security Firm Exein Raises $81 Million  Security Week News
Ransomware Attack Disrupts Local Emergency Alert System Across US Ransomware Attack Disrupts Local Emergency Alert System Across US Security Week News
Chrome 140 Update Patches Sixth Zero-Day of 2025 Chrome 140 Update Patches Sixth Zero-Day of 2025 Security Week News
Webinar Today: Ransomware Defense That Meets Evolving Compliance Mandates Webinar Today: Ransomware Defense That Meets Evolving Compliance Mandates Security Week News
ThreatSpike Raises  Million in Series A Funding ThreatSpike Raises $14 Million in Series A Funding Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News