Perplexity (Comet Browser)

Perplexity (Comet Browser)

Cybersecurity researchers at SquareX uncovered a critical **vulnerability** in **Comet**, Perplexity’s AI-powered browser, tied to a hidden **MCP API** (chrome.perplexity.mcp.addStdioServer) within the **Agentic extension**. This API allows arbitrary local command execution on users' devices—a capability explicitly banned in traditional browsers like Chrome or Firefox. The flaw stems from weak security controls, exposing users to **full device takeover** if attackers compromise **perplexity.ai** via methods like **XSS, phishing, or insider threats**. SquareX demonstrated the risk by spoofing a malicious extension, injecting a script into perplexity.ai, and leveraging the MCP API to execute **WannaCry ransomware**. The vulnerability creates a **catastrophic third-party risk**, where users’ security depends entirely on Perplexity’s defenses, with no mitigation options. The researchers warned that exploitation is inevitable, given the browser’s deviation from decades of established security principles. A single breach of Perplexity’s infrastructure could grant attackers **unprecedented control** over all Comet users’ devices, enabling large-scale malware deployment, data theft, or system hijacking.

Source: https://www.techradar.com/pro/security/perplexitys-comet-ai-browser-may-have-some-concerning-security-flaws-which-could-let-hacker-hijack-your-device

Perplexity cybersecurity rating report: https://www.rankiteo.com/company/perplexity-ai

"id": "PER2362223112125",
"linkid": "perplexity-ai",
"type": "Vulnerability",
"date": "11/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'customers_affected': 'All Comet Browser Users',
                        'industry': 'AI/Technology (Browser Development)',
                        'name': 'Perplexity AI',
                        'type': 'Organization'}],
 'attack_vector': ['Malicious Extension (Extension Stomping)',
                   'Cross-Site Scripting (XSS)',
                   'Man-in-the-Middle (MitM) Attack',
                   'Phishing (Perplexity Employee Targeting)',
                   'Insider Threat'],
 'description': 'SquareX discovered a major vulnerability in Comet, the AI '
                'browser built by Perplexity, which could allow threat actors '
                'to take over a victim’s device entirely. The browser contains '
                'a hidden API (named MCP API: '
                'chrome.perplexity.mcp.addStdioServer) capable of executing '
                'arbitrary local commands on users’ devices—a capability '
                'explicitly prohibited by traditional browsers. The '
                'vulnerability resides in the Agentic extension, which can be '
                'triggered via the perplexity.ai site. A compromise of '
                'Perplexity’s site (e.g., via XSS, phishing, or insider '
                "threat) could grant attackers control over all Comet users' "
                'devices. SquareX demonstrated this by spoofing a legitimate '
                'extension, sideloading it, and executing WannaCry via the MCP '
                'API. Researchers warn of catastrophic third-party risk due to '
                "users' reliance on Perplexity's security posture.",
 'impact': {'brand_reputation_impact': 'High (Catastrophic third-party risk '
                                       'exposure, reversal of browser security '
                                       'principles)',
            'operational_impact': 'Full device takeover risk for all Comet '
                                  'users via Perplexity site compromise',
            'systems_affected': ['Comet Browser (All User Devices)',
                                 'Underlying Operating Systems']},
 'initial_access_broker': {'backdoors_established': 'MCP API '
                                                    '(chrome.perplexity.mcp.addStdioServer)',
                           'entry_point': ['Compromised perplexity.ai site',
                                           'Malicious Extension (Agentic)',
                                           'XSS/Phishing/Insider Threat'],
                           'high_value_targets': "All Comet Browser Users' "
                                                 'Devices'},
 'investigation_status': 'Ongoing (Pending Response from Perplexity)',
 'lessons_learned': 'Adherence to established browser security principles '
                    '(e.g., Chrome, Safari, Firefox) is critical to prevent '
                    'arbitrary command execution. Third-party dependencies '
                    '(e.g., perplexity.ai site) can introduce catastrophic '
                    'risks if compromised. Custom APIs with elevated '
                    'privileges must undergo rigorous security reviews.',
 'post_incident_analysis': {'root_causes': ['Lack of adherence to browser '
                                            'security principles (e.g., '
                                            'prohibiting arbitrary command '
                                            'execution).',
                                            'Overprivileged custom API (MCP) '
                                            'in Agentic extension.',
                                            'Third-party risk concentration '
                                            '(single point of failure via '
                                            'perplexity.ai).',
                                            'Insufficient extension '
                                            'sandboxing.']},
 'ransomware': {'ransomware_strain': 'WannaCry (Demo Only)'},
 'recommendations': ['Disable or remove the MCP API in Comet Browser '
                     'immediately.',
                     'Implement strict sandboxing for extensions to prevent '
                     'arbitrary command execution.',
                     'Conduct third-party security audits for perplexity.ai '
                     'and embedded extensions.',
                     'Enforce multi-factor authentication (MFA) for Perplexity '
                     'employees to mitigate phishing risks.',
                     'Monitor for extension stomping, XSS, and MitM attacks '
                     'targeting the Agentic extension.',
                     'Provide users with transparency tools to assess and '
                     'mitigate third-party risks.'],
 'references': [{'source': 'TechRadar',
                 'url': 'https://www.techradar.com/news/squarex-discovered-hidden-mcp-api-in-comet-browser-enabling-arbitrary-local-command-execution'}],
 'response': {'communication_strategy': ['Media Outreach (TechRadar)',
                                         'Pending Response from Perplexity'],
              'third_party_assistance': ['SquareX (Research/Disclosure)']},
 'title': 'Hidden MCP API in Comet Browser Enabling Arbitrary Local Command '
          'Execution',
 'type': ['Vulnerability Exploitation',
          'Arbitrary Code Execution',
          'Third-Party Risk'],
 'vulnerability_exploited': 'Hidden MCP API '
                            '(chrome.perplexity.mcp.addStdioServer) in Agentic '
                            'Extension (Arbitrary Local Command Execution)'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.