Description
A weakness has been identified in BrowserOperator browser-operator-core up to 0.6.0. Affected is the function startsWith of the file scripts/component_server/server.js. Executing a manipulation of the argument request.url can lead to path traversal. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Problem types
Product status
0.2
0.3
0.4
0.5
0.6.0
Timeline
| 2026-04-27: | Advisory disclosed |
| 2026-04-27: | VulDB entry created |
| 2026-04-27: | VulDB entry last update |
Credits
BruceJin (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/359843 (VDB-359843 | BrowserOperator browser-operator-core server.js startsWith path traversal)
vuldb.com/vuln/359843/cti (VDB-359843 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/802762 (Submit #802762 | BrowserOperator browser-operator-core 0.6.0 Path Traversal)
github.com/BrowserOperator/browser-operator-core/issues/96
github.com/BrowserOperator/browser-operator-core/