Vulnerability Description
PlaywrightCapture is a simple replacement for splash using playwright. Prior to 1.39.6, PlaywrightCapture did not sufficiently restrict navigations and resource requests initiated by rendered pages. An attacker-controlled page could abuse browser-side redirection mechanisms, such as window.location.href, to make the capture process open file:// URLs or request resources hosted on private, loopback, link-local, or otherwise non-public IP addresses. In deployments where PlaywrightCapture processes untrusted URLs, this could allow a remote attacker to perform server-side request forgery against internal services or attempt to access local files from the capture environment. Depending on what capture artifacts are generated and exposed, responses from those resources could potentially be leaked through screenshots, saved page content, logs, or other capture outputs. This vulnerability is fixed in 1.39.6.
Related Weaknesses (CWE)
References
- https://github.com/Lookyloo/PlaywrightCapture/commit/49e289eba756e4fbac1322c33cf
- https://github.com/Lookyloo/PlaywrightCapture/security/advisories/GHSA-687h-xw6f
FAQ
What is CVE-2026-44439?
CVE-2026-44439 is a documented vulnerability. PlaywrightCapture is a simple replacement for splash using playwright. Prior to 1.39.6, PlaywrightCapture did not sufficiently restrict navigations and resource requests initiated by rendered pages. A...
How severe is CVE-2026-44439?
CVSS scoring is not yet available for CVE-2026-44439. Check NVD for updates.
Is there a patch for CVE-2026-44439?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.