CVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
Microsoft Playwright MCP Server versions prior to 0.0.40 fails to validate the Origin header on incoming connections. This allows an attacker to perform a DNS rebinding attack via a victim’s web browser and send unauthorized requests to a locally running MCP server, resulting in unintended invocation of MCP tool endpoints.
AI Analysis
Technical Summary
CVE-2025-9611 is a vulnerability identified in Microsoft Playwright MCP Server versions before 0.0.40, classified under CWE-749 (Exposed Dangerous Method or Function). The core issue is the failure to validate the Origin header on incoming HTTP connections. This validation omission allows an attacker to perform a DNS rebinding attack, a technique where the attacker manipulates DNS responses to make a victim's browser interact with a local service (in this case, the MCP server) as if it were a legitimate remote service. By exploiting this, an attacker can send unauthorized HTTP requests to the MCP server running locally on the victim's machine, triggering unintended invocation of MCP tool endpoints. These endpoints may perform sensitive operations or expose internal functionality not meant to be accessible externally. The vulnerability does not require any prior authentication and can be triggered with minimal user interaction, typically just visiting a malicious webpage. The CVSS 4.0 score of 7.2 reflects a high severity, considering the network attack vector, low attack complexity, no privileges required, but requiring user interaction. The impact covers confidentiality, integrity, and availability, with high impact on availability and integrity, and low on confidentiality. No patches are currently linked, and no known exploits have been reported in the wild, but the risk remains significant due to the nature of the attack vector and the potential for local system compromise via browser-based attacks.
Potential Impact
The vulnerability allows attackers to bypass same-origin policy protections by exploiting DNS rebinding, enabling unauthorized access to local MCP server endpoints. This can lead to unauthorized execution of commands or operations within the MCP tool, potentially compromising system integrity and availability. Confidential data exposure risk is lower but still present if sensitive information is accessible via these endpoints. The attack requires user interaction (visiting a malicious site), making social engineering a factor. Organizations relying on Playwright MCP Server for automation or testing may face disruption of services or unauthorized manipulation of their local environments. The broad use of Playwright in development environments globally increases the potential attack surface. If exploited at scale, this could lead to widespread disruption in development pipelines and local system compromise, especially in environments where local MCP servers are exposed or trusted implicitly by developers.
Mitigation Recommendations
Until an official patch is released, organizations should implement network-level controls to restrict access to the MCP server, such as firewall rules limiting connections to localhost only. Browser security settings can be hardened to mitigate DNS rebinding attacks, including disabling or restricting DNS rebinding protections where possible. Developers should avoid running MCP servers on machines exposed to untrusted networks and educate users about the risks of visiting untrusted websites. Monitoring local MCP server logs for unusual or unauthorized requests can help detect exploitation attempts. Once patches become available, immediate application is critical. Additionally, implementing strict Origin header validation on the server side and employing Content Security Policy (CSP) headers to restrict resource loading can reduce attack vectors. Employing endpoint security solutions that detect anomalous local network traffic may also help mitigate exploitation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, South Korea, India, Netherlands
CVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
Description
Microsoft Playwright MCP Server versions prior to 0.0.40 fails to validate the Origin header on incoming connections. This allows an attacker to perform a DNS rebinding attack via a victim’s web browser and send unauthorized requests to a locally running MCP server, resulting in unintended invocation of MCP tool endpoints.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-9611 is a vulnerability identified in Microsoft Playwright MCP Server versions before 0.0.40, classified under CWE-749 (Exposed Dangerous Method or Function). The core issue is the failure to validate the Origin header on incoming HTTP connections. This validation omission allows an attacker to perform a DNS rebinding attack, a technique where the attacker manipulates DNS responses to make a victim's browser interact with a local service (in this case, the MCP server) as if it were a legitimate remote service. By exploiting this, an attacker can send unauthorized HTTP requests to the MCP server running locally on the victim's machine, triggering unintended invocation of MCP tool endpoints. These endpoints may perform sensitive operations or expose internal functionality not meant to be accessible externally. The vulnerability does not require any prior authentication and can be triggered with minimal user interaction, typically just visiting a malicious webpage. The CVSS 4.0 score of 7.2 reflects a high severity, considering the network attack vector, low attack complexity, no privileges required, but requiring user interaction. The impact covers confidentiality, integrity, and availability, with high impact on availability and integrity, and low on confidentiality. No patches are currently linked, and no known exploits have been reported in the wild, but the risk remains significant due to the nature of the attack vector and the potential for local system compromise via browser-based attacks.
Potential Impact
The vulnerability allows attackers to bypass same-origin policy protections by exploiting DNS rebinding, enabling unauthorized access to local MCP server endpoints. This can lead to unauthorized execution of commands or operations within the MCP tool, potentially compromising system integrity and availability. Confidential data exposure risk is lower but still present if sensitive information is accessible via these endpoints. The attack requires user interaction (visiting a malicious site), making social engineering a factor. Organizations relying on Playwright MCP Server for automation or testing may face disruption of services or unauthorized manipulation of their local environments. The broad use of Playwright in development environments globally increases the potential attack surface. If exploited at scale, this could lead to widespread disruption in development pipelines and local system compromise, especially in environments where local MCP servers are exposed or trusted implicitly by developers.
Mitigation Recommendations
Until an official patch is released, organizations should implement network-level controls to restrict access to the MCP server, such as firewall rules limiting connections to localhost only. Browser security settings can be hardened to mitigate DNS rebinding attacks, including disabling or restricting DNS rebinding protections where possible. Developers should avoid running MCP servers on machines exposed to untrusted networks and educate users about the risks of visiting untrusted websites. Monitoring local MCP server logs for unusual or unauthorized requests can help detect exploitation attempts. Once patches become available, immediate application is critical. Additionally, implementing strict Origin header validation on the server side and employing Content Security Policy (CSP) headers to restrict resource loading can reduce attack vectors. Employing endpoint security solutions that detect anomalous local network traffic may also help mitigate exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-08-28T15:34:36.069Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695de3cb873865b86365f414
Added to database: 1/7/2026, 4:40:43 AM
Last enriched: 3/5/2026, 9:14:11 AM
Last updated: 3/26/2026, 3:44:19 AM
Views: 387
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.