Home

Description

PlaywrightCapture is a simple replacement for splash using playwright. Prior to 1.39.6, PlaywrightCapture did not sufficiently restrict navigations and resource requests initiated by rendered pages. An attacker-controlled page could abuse browser-side redirection mechanisms, such as window.location.href, to make the capture process open file:// URLs or request resources hosted on private, loopback, link-local, or otherwise non-public IP addresses. In deployments where PlaywrightCapture processes untrusted URLs, this could allow a remote attacker to perform server-side request forgery against internal services or attempt to access local files from the capture environment. Depending on what capture artifacts are generated and exposed, responses from those resources could potentially be leaked through screenshots, saved page content, logs, or other capture outputs. This vulnerability is fixed in 1.39.6.

PUBLISHED Reserved 2026-05-06 | Published 2026-05-13 | Updated 2026-05-15 | Assigner GitHub_M




MEDIUM: 6.6CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 1.39.6
affected

References

github.com/...apture/security/advisories/GHSA-687h-xw6f-q2qw

github.com/...ommit/49e289eba756e4fbac1322c33cfd111411562405

cve.org (CVE-2026-44439)

nvd.nist.gov (CVE-2026-44439)

Download JSON