Use of curl with the -k (or --insecure) flag in installer scripts allows attackers to deliver arbitrary executables via Man-in-the-Middle (MitM) attacks. This can lead to full system compromise, as the downloaded files are installed as privileged applications.
The following scripts in the microsoft/playwright repository at commit <code>bee11cbc28f24bd18e726163d0b9b1571b4f26a8</code> use curl -k to fetch and install executable packages without verifying the authenticity of the SSL certificate:
In each case, the shell scripts download a browser installer package using curl -k and immediately install it:
curl --retry 3 -o ./<pkg-file> -k <url>
sudo installer -pkg /tmp/<pkg-file> -target /
Disabling SSL verification (-k) means the download can be intercepted and replaced with malicious content.
A high-level exploitation scenario:
curl -k is used, the script downloads and installs the attacker's payload without any certificate validation.No special configuration is needed: simply running these scripts on any untrusted or hostile network is enough.
This is a critical Remote Code Execution (RCE) vulnerability due to improper SSL certificate validation (CWE-295: Improper Certificate Validation). Any user or automation running these scripts is at risk of arbitrary code execution as root/admin, system compromise, data theft, or persistent malware installation. The risk is especially severe because browser packages are installed with elevated privileges and the scripts may be used in CI/CD or developer environments.
{
"cwe_ids": [
"CWE-347"
],
"github_reviewed": true,
"github_reviewed_at": "2025-10-20T14:19:32Z",
"severity": "HIGH",
"nvd_published_at": "2025-10-14T17:16:11Z"
}