Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6fg3-hvw7-2fwq | Microsoft Playwright MCP Server vulnerable to DNS Rebinding Attack; Allows Attackers Access to All Server Tools |
Thu, 05 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:microsoft:playwright:*:*:*:*:*:*:*:* |
Wed, 07 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 07 Jan 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft playwright |
|
| Vendors & Products |
Microsoft
Microsoft playwright |
Wed, 07 Jan 2026 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Microsoft Playwright MCP Server versions prior to 0.0.40 fails to validate the Origin header on incoming connections. This allows an attacker to perform a DNS rebinding attack via a victim’s web browser and send unauthorized requests to a locally running MCP server, resulting in unintended invocation of MCP tool endpoints. | |
| Title | Microsoft Playwright MCP Server < 0.0.40 DNS Rebinding via Missing Origin Header Validation | |
| Weaknesses | CWE-749 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T01:30:00.974Z
Reserved: 2025-08-28T15:34:36.069Z
Link: CVE-2025-9611
Updated: 2026-01-07T14:25:14.799Z
Status : Deferred
Published: 2026-01-07T12:17:06.697
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-9611
No data.
OpenCVE Enrichment
Updated: 2026-01-07T10:08:03Z
Github GHSA