Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SquareX and Perplexity Quarrel Over Alleged Comet Browser Vulnerability

Posted on November 21, 2025November 21, 2025 By CWS

Browser safety agency SquareX claims to have discovered a doubtlessly crucial vulnerability in Perplexity’s Comet AI browser. Perplexity has taken steps to dam the assault, however has strongly disputed the findings. 

SquareX’s controversial analysis is centered round a limited-documentation Mannequin Context Protocol (MCP) API and two hidden Analytics and Agentic extensions which can be utilized by Comet and can’t be disabled.

MCP is usually used to attach AI functions to exterior information sources and instruments. SquareX discovered that the Agentic extension is designed for executing all of Comet’s agentic automation capabilities, whereas the Analytics extension is designed for amassing and processing browser information and monitoring the actions of the Agentic extension. 

SquareX found that each extensions can solely talk with ‘perplexity.ai’ subdomains and the entry of the API is restricted to those subdomains. 

Nonetheless, based on SquareX, if an attacker can achieve entry to the ‘perplexity.ai’ area or compromise the agentic extension, they will abuse the MCP API to execute instructions on the host gadget with out requesting the person’s permission. This allows the attacker to take management of the sufferer’s gadget and execute ransomware, monitor person exercise, or exfiltrate information, SquareX warned.

The browser safety agency has admitted that to launch an assault, a menace actor would want to hijack an extension by an XSS or MitM community assault, or achieve entry to Perplexity methods to compromise the extension. 

In an assault demonstration, SquareX researchers used a way referred to as ‘extension stomping’, which includes making a malicious extension that impersonates the respectable Comet analytics extension and sideloading it. They confirmed how the assault can be utilized to deploy ransomware. 

SquareX mentioned it reported its findings to Perplexity on November 4, nevertheless it had not obtained any response by the point of disclosure. Commercial. Scroll to proceed studying.

Contacted by SecurityWeek, Perplexity mentioned it did implement some measures to forestall the assault methodology described by SquareX out of an abundance of warning, however described it as “pretend safety analysis”. 

“This complete state of affairs is contrived and doesn’t characterize any precise expertise safety threat,” defined a Perplexity spokesperson. “If it’s a threat in any respect, it’s a threat of people being phished and satisfied to manually load malware, however even they admit that’s unrealistic and it must be a Perplexity worker with manufacturing entry who modifications the present extension for a nasty one.”

Perplexity identified that SquareX’s video demonstration reveals the assault requiring important human intervention.

The browser vendor has additionally disputed claims that Comet doesn’t explicitly get hold of person consent for native system actions. The corporate contends that customers should conform to putting in native MCPs, and any subsequent command from the MCP requires person affirmation.

Perplexity mentioned it’s not conscious of any assaults geared toward Comet customers and identified that it does work with safety researchers to proactively determine and patch potential vulnerabilities. Nonetheless, the corporate mentioned that whereas SquareX did attain out, its bug report couldn’t be accessed, and the safety agency didn’t reply to requests for entry to the vulnerability info. 

In response to Perplexity’s feedback, SquareX identified that whereas the extension stomping approach it utilized in its demonstration does require person interplay, its level was to reveal the permissions and inherent threat of the MCP API. The corporate famous that different assault vectors, corresponding to provide chain compromise, XSS, or MitM assaults, would require much less person interplay.  

SquareX additionally mentioned that in its experiments its researchers had been by no means prompted for permission and that the ransomware was instantly executed after the Comet browser was reopened.

SquareX famous that Perplexity’s patch is “good news from a safety perspective and we’re glad that our analysis might contribute to creating the AI Browser safer”.

Associated: Hackers Goal Perplexity Comet Browser Customers

Associated: LayerX Raises $11 Million for Browser Safety Answer

Associated: AI Sidebar Spoofing Places ChatGPT Atlas, Perplexity Comet and Different Browsers at Threat

Security Week News Tags:Alleged, Browser, Comet, Perplexity, Quarrel, SquareX, Vulnerability

Post navigation

Previous Post: Broadcom Allegedly Breached by Clop Ransomware via E-Business Suite 0-Day Hack
Next Post: Chinese Cyberspies Deploy ‘BadAudio’ Malware via Supply Chain Attacks

Related Posts

Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector Security Week News
Madhu Gottumukkala Officially Appointed CISA Deputy Director Security Week News
Managing the Trust-Risk Equation in AI: Predicting Hallucinations Before They Strike Security Week News
Anubis Ransomware Packs a Wiper to Permanently Delete Files Security Week News
Salesforce Instances Hacked via Gainsight Integrations Security Week News
In Other News: Norway Dam Hacked, $177M Data Breach Settlement, UNFI Attack Update Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark