Authorization Bypass Through User-Controlled Key Affecting browser-use package, versions [,0.1.41)


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Authorization Bypass Through User-Controlled Key vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-BROWSERUSE-12304093
  • published1 Sept 2025
  • disclosed1 May 2025
  • creditUnknown

Introduced: 1 May 2025

CVE NOT AVAILABLE CWE-639  (opens in a new tab)

How to fix?

Upgrade browser-use to version 0.1.41 or higher.

Overview

browser-use is a Make websites accessible for AI agents

Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key due to the default settings disable_security=True and --remote-debugging-address=0.0.0.0. A remote attacker can execute arbitrary commands or exfiltrate cross‑origin data via port 9222.

References

CVSS Base Scores

version 4.0
version 3.1