Description
A weakness has been identified in BrowserOperator browser-operator-core up to 0.6.0. Affected is the function startsWith of the file scripts/component_server/server.js. Executing a manipulation of the argument request.url can lead to path traversal. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-04-28
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: Remote arbitrary file access
Action: Immediate Patch
AI Analysis

Impact

BrowserOperator browser-operator-core contains a path‑traversal flaw in the startsWith function of scripts/component_server/server.js. By manipulating the request.url parameter, an attacker can cause the server to resolve file paths that escape the intended directory. Although the flaw itself does not provide an immediate remote code execution vector, it allows reading or overwriting arbitrary files, potentially enabling further exploitation such as execution of injected code or data exfiltration.

Affected Systems

The vulnerability exists in BrowserOperator browser-operator-core version 0.6.0 and earlier. No other product or vendor names are affected. The software is distributed under an open source license and hosted on GitHub.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate risk. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. The exploit is available publicly and can be launched remotely. Path‑traversal conditions are satisfied when the server processes incoming HTTP requests containing a crafted URL, so an attacker with network access to the exposed API can exercise the weakness.

Generated by OpenCVE AI on April 28, 2026 at 12:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a browser-operator-core release newer than 0.6.0 once it becomes available
  • Apply input validation or sanitization to the request.url parameter to eliminate directory traversal sequences before they reach the filesystem
  • Restrict the application’s filesystem permissions so that only required directories are accessible from the server’s working directory

Generated by OpenCVE AI on April 28, 2026 at 12:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Browseroperator
Browseroperator browser-operator-core
Vendors & Products Browseroperator
Browseroperator browser-operator-core

Tue, 28 Apr 2026 06:30:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in BrowserOperator browser-operator-core up to 0.6.0. Affected is the function startsWith of the file scripts/component_server/server.js. Executing a manipulation of the argument request.url can lead to path traversal. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Title BrowserOperator browser-operator-core server.js startsWith path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Browseroperator Browser-operator-core
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-28T06:15:13.509Z

Reserved: 2026-04-27T17:04:04.203Z

Link: CVE-2026-7234

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-28T07:16:04.247

Modified: 2026-04-28T07:16:04.247

Link: CVE-2026-7234

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T12:30:31Z

Weaknesses