Exposed Dangerous Method or Function Affecting playwright package, versions <1.56.0


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.17% (38th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-PLAYWRIGHT-14888269
  • published7 Jan 2026
  • disclosed7 Jan 2026
  • creditJonathan Leitschuh

Introduced: 7 Jan 2026

CVE-2025-9611  (opens in a new tab)
CWE-749  (opens in a new tab)

How to fix?

Upgrade playwright to version 1.56.0 or higher.

Overview

playwright is an A high-level API to automate web browsers

Affected versions of this package are vulnerable to Exposed Dangerous Method or Function via missing validation of the Origin header on incoming connections. An attacker can gain unauthorized access to locally running endpoints by leveraging DNS rebinding through a victim’s web browser.

PoC

> curl -N http://127.0.0.1:8931/mcp \
  -H "Origin: attacker.com" \
  -H "Content-Type: application/json" \
  -H "Accept: text/event-stream application/json" \
  -d '{
    "jsonrpc": "2.0",
    "id": 1,
    "method": "initialize",
    "params": {
      "protocolVersion": "2025-03-26",
      "capabilities": {
        "roots": {
          "listChanged": true
        },
        "sampling": {}
      },
      "clientInfo": {
        "name": "ExampleClient",
        "version": "1.0.0"
      }
    }
  }'

References

CVSS Base Scores

version 4.0
version 3.1