๐Ÿ” CVE Alert

CVE-2026-44439

UNKNOWN 0.0

LookyLoo - PlaywrightCapture permits access to local files and internal network resources during page capture

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

PlaywrightCapture is a simple replacement for splash using playwright. Prior to 1.39.6, PlaywrightCapture did not sufficiently restrict navigations and resource requests initiated by rendered pages. An attacker-controlled page could abuse browser-side redirection mechanisms, such as window.location.href, to make the capture process open file:// URLs or request resources hosted on private, loopback, link-local, or otherwise non-public IP addresses. In deployments where PlaywrightCapture processes untrusted URLs, this could allow a remote attacker to perform server-side request forgery against internal services or attempt to access local files from the capture environment. Depending on what capture artifacts are generated and exposed, responses from those resources could potentially be leaked through screenshots, saved page content, logs, or other capture outputs. This vulnerability is fixed in 1.39.6.

CWE CWE-918
Vendor lookyloo
Product playwrightcapture
Published May 13, 2026
Stay Ahead of the Next One

Get instant alerts for lookyloo playwrightcapture

Be the first to know when new unknown vulnerabilities affecting lookyloo playwrightcapture are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Lookyloo / PlaywrightCapture
< 1.39.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/Lookyloo/PlaywrightCapture/security/advisories/GHSA-687h-xw6f-q2qw github.com: https://github.com/Lookyloo/PlaywrightCapture/commit/49e289eba756e4fbac1322c33cfd111411562405