Server-side Request Forgery (SSRF) Affecting playwrightcapture package, versions [,1.39.6)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.13% (33rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-PLAYWRIGHTCAPTURE-16635355
  • published11 May 2026
  • disclosed6 May 2026
  • creditjeroengui

Introduced: 6 May 2026

NewCVE-2026-44439  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade PlaywrightCapture to version 1.39.6 or higher.

Overview

PlaywrightCapture is an A simple library to capture websites using playwright

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) in the capture process. An attacker can access internal network resources or local files by supplying a crafted URL that triggers browser-side redirection mechanisms, such as manipulating window.location.href. This may result in sensitive information from internal services or local files being exposed through capture artifacts like screenshots, saved content, or logs. This is only exploitable if untrusted URLs are processed without enabling the only_global_lookup setting.

CVSS Base Scores

version 4.0
version 3.1