NodeJS/playwright/1.5.0-next.1603759343720
A high-level API to automate web browsers
https://www.npmjs.com/package/playwright
Apache-2.0
1 Security Vulnerabilities
Playwright downloads and installs browsers without verifying the authenticity of the SSL certificate
- https://nvd.nist.gov/vuln/detail/CVE-2025-59288
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59288
- https://github.com/SocketDev/security-research/security/advisories/GHSA-qxm8-4v54-964r
- https://github.com/microsoft/playwright/pull/37532
- https://github.com/microsoft/playwright/commit/72c62d840247d9defd87c6beb0344d456794b570
- https://github.com/microsoft/playwright/releases/tag/v1.55.1
- https://github.com/microsoft/playwright/releases/tag/v1.56.0
- https://github.com/advisories/GHSA-7mvr-c777-76hp
Summary
Use of curl with the -k (or --insecure) flag in installer scripts allows attackers to deliver arbitrary executables via Man-in-the-Middle (MitM) attacks. This can lead to full system compromise, as the downloaded files are installed as privileged applications.
Details
The following scripts in the microsoft/playwright repository at commit bee11cbc28f24bd18e726163d0b9b1571b4f26a8 use curl -k to fetch and install executable packages without verifying the authenticity of the SSL certificate:
packages/playwright-core/bin/reinstall_chrome_beta_mac.shpackages/playwright-core/bin/reinstall_chrome_stable_mac.shpackages/playwright-core/bin/reinstall_msedge_dev_mac.shpackages/playwright-core/bin/reinstall_msedge_beta_mac.shpackages/playwright-core/bin/reinstall_msedge_stable_mac.sh
In each case, the shell scripts download a browser installer package using curl -k and immediately install it:
curl --retry 3 -o ./<pkg-file> -k <url>
sudo installer -pkg /tmp/<pkg-file> -target /
Disabling SSL verification (-k) means the download can be intercepted and replaced with malicious content.
PoC
A high-level exploitation scenario:
- An attacker performs a MitM attack on a network where the victim runs one of these scripts.
- The attacker intercepts the HTTPS request and serves a malicious package (for example, a trojaned browser installer).
- Because
curl -kis used, the script downloads and installs the attacker's payload without any certificate validation. - The attacker's code is executed with system privileges, leading to full compromise.
No special configuration is needed: simply running these scripts on any untrusted or hostile network is enough.
Impact
This is a critical Remote Code Execution (RCE) vulnerability due to improper SSL certificate validation (CWE-295: Improper Certificate Validation). Any user or automation running these scripts is at risk of arbitrary code execution as root/admin, system compromise, data theft, or persistent malware installation. The risk is especially severe because browser packages are installed with elevated privileges and the scripts may be used in CI/CD or developer environments.
Fix
- https://github.com/microsoft/playwright/commit/72c62d840247d9defd87c6beb0344d456794b570
- https://github.com/microsoft/playwright/pull/37532
- https://github.com/microsoft/playwright/releases/tag/v1.56.0
Credit
- This vulnerability was uncovered by tooling by Socket
- This vulnerability was confirmed by @evilpacket
- This vulnerability was reported by @JLLeitschuh at Socket
Disclosure
- September 10th, 2025 - Disclosed to Microsoft privately via https://github.com/microsoft/playwright/security/advisories/GHSA-gx27-2j22-qcx8
- September 11th, 2025 - Reported to Microsoft via MSRC Researcher Portal - https://msrc.microsoft.com/report/vulnerability/VULN-162854
- September 11th, 2025 - Microsoft closed report as
Complete - N/A
- September 18th, 2025 - Following a LinkedIn Post
5461 Other Versions
| Version | License | Security | Released | |
|---|---|---|---|---|
| 1.6.0-next.1604517936339 | Apache-2.0 | 1 | 2020-11-04 - 19:25 | over 5 years |
| 1.6.0-next.1604516539153 | Apache-2.0 | 1 | 2020-11-04 - 19:02 | over 5 years |
| 1.6.0-next.1604514370393 | Apache-2.0 | 1 | 2020-11-04 - 18:26 | over 5 years |
| 1.6.0-next.1604511976624 | Apache-2.0 | 1 | 2020-11-04 - 17:46 | over 5 years |
| 1.6.0-next.1604504458977 | Apache-2.0 | 1 | 2020-11-04 - 15:41 | over 5 years |
| 1.6.0-next.1604504226151 | Apache-2.0 | 1 | 2020-11-04 - 15:37 | over 5 years |
| 1.6.0-next.1604458863005 | Apache-2.0 | 1 | 2020-11-04 - 03:01 | over 5 years |
| 1.6.0-next.1604458657431 | Apache-2.0 | 1 | 2020-11-04 - 02:57 | over 5 years |
| 1.6.0-next.1604449454516 | Apache-2.0 | 1 | 2020-11-04 - 00:24 | over 5 years |
| 1.6.0-next.1604444190264 | Apache-2.0 | 1 | 2020-11-03 - 22:56 | over 5 years |
| 1.6.0-next.1604444008055 | Apache-2.0 | 1 | 2020-11-03 - 22:53 | over 5 years |
| 1.6.0-next.1604442905543 | Apache-2.0 | 1 | 2020-11-03 - 22:35 | over 5 years |
| 1.6.0-next.1604438335710 | Apache-2.0 | 1 | 2020-11-03 - 21:19 | over 5 years |
| 1.6.0-next.1604431974611 | Apache-2.0 | 1 | 2020-11-03 - 19:33 | over 5 years |
| 1.6.0-next.1604407132436 | Apache-2.0 | 1 | 2020-11-03 - 12:39 | over 5 years |
| 1.6.0-next.1604379778790 | Apache-2.0 | 1 | 2020-11-03 - 05:03 | over 5 years |
| 1.6.0-next.1604375030788 | Apache-2.0 | 1 | 2020-11-03 - 03:44 | over 5 years |
| 1.6.0-next.1604370816246 | Apache-2.0 | 1 | 2020-11-03 - 02:33 | over 5 years |
| 1.6.0-next.1604370589377 | Apache-2.0 | 1 | 2020-11-03 - 02:30 | over 5 years |
| 1.6.0-next.1604367121136 | Apache-2.0 | 1 | 2020-11-03 - 01:32 | over 5 years |
| 1.6.0-next.1604363004235 | Apache-2.0 | 1 | 2020-11-03 - 00:23 | over 5 years |
| 1.6.0-next.1604356576502 | Apache-2.0 | 1 | 2020-11-02 - 22:36 | over 5 years |
| 1.6.0-next.1604355180033 | Apache-2.0 | 1 | 2020-11-02 - 22:13 | over 5 years |
| 1.6.0-next.1604353250286 | Apache-2.0 | 1 | 2020-11-02 - 21:41 | over 5 years |
| 1.6.0-next.1604351328220 | Apache-2.0 | 1 | 2020-11-02 - 21:09 | over 5 years |
| 1.6.0-next.1604350952367 | Apache-2.0 | 1 | 2020-11-02 - 21:02 | over 5 years |
| 1.6.0-next.1604350213419 | Apache-2.0 | 1 | 2020-11-02 - 20:50 | over 5 years |
| 1.6.0-next.1604345898278 | Apache-2.0 | 1 | 2020-11-02 - 19:38 | over 5 years |
| 1.6.0-next.1604099897983 | Apache-2.0 | 1 | 2020-10-30 - 23:18 | over 5 years |
| 1.6.0-next.1604094577517 | Apache-2.0 | 1 | 2020-10-30 - 21:49 | over 5 years |
| 1.6.0-next.1604090471094 | Apache-2.0 | 1 | 2020-10-30 - 20:41 | over 5 years |
| 1.6.0-next.1604087279768 | Apache-2.0 | 1 | 2020-10-30 - 19:48 | over 5 years |
| 1.6.0-next.1604087072812 | Apache-2.0 | 1 | 2020-10-30 - 19:44 | over 5 years |
| 1.6.0-next.1604079389424 | Apache-2.0 | 1 | 2020-10-30 - 17:36 | over 5 years |
| 1.6.0-next.1604018890865 | Apache-2.0 | 1 | 2020-10-30 - 00:48 | over 5 years |
| 1.7.1 | Apache-2.0 | 1 | 2020-12-22 - 18:41 | over 5 years |
| 1.7.0 | Apache-2.0 | 1 | 2020-12-15 - 23:09 | over 5 years |
| 1.5.2-next.1603833673751 | Apache-2.0 | 1 | 2020-10-27 - 21:21 | over 5 years |
| 1.5.1-next.1603830636096 | Apache-2.0 | 1 | 2020-10-27 - 20:30 | over 5 years |
| 1.5.1-next.1603774056456 | Apache-2.0 | 1 | 2020-10-27 - 04:47 | over 5 years |
| 1.5.1-next.1603475519841 | Apache-2.0 | 1 | 2020-10-23 - 17:52 | over 5 years |
| 1.5.0-next.1604014572633 | Apache-2.0 | 1 | 2020-10-29 - 23:36 | over 5 years |
| 1.5.0-next.1604013309987 | Apache-2.0 | 1 | 2020-10-29 - 23:15 | over 5 years |
| 1.5.0-next.1603998405942 | Apache-2.0 | 1 | 2020-10-29 - 19:07 | over 5 years |
| 1.5.0-next.1603926163258 | Apache-2.0 | 1 | 2020-10-28 - 23:02 | over 5 years |
| 1.5.0-next.1603926030124 | Apache-2.0 | 1 | 2020-10-28 - 23:00 | over 5 years |
| 1.5.0-next.1603925710895 | Apache-2.0 | 1 | 2020-10-28 - 22:55 | over 5 years |
| 1.5.0-next.1603921760661 | Apache-2.0 | 1 | 2020-10-28 - 21:49 | over 5 years |
| 1.5.0-next.1603918082127 | Apache-2.0 | 1 | 2020-10-28 - 20:48 | over 5 years |
| 1.5.0-next.1603907834797 | Apache-2.0 | 1 | 2020-10-28 - 17:57 | over 5 years |
