The cloakserve CDP multiplexer uses the user-supplied fingerprint query parameter directly as a filesystem path component when creating Chrome profile directories. An unauthenticated attacker who can reach the cloakserve port can supply a crafted fingerprint value containing path traversal sequences to resolve user_data_dir outside the configured data_dir. When Chrome fails to start or the process is cleaned up, shutil.rmtree() deletes the traversed path, resulting in arbitrary directory deletion.
Additionally, cloakserve bound to 0.0.0.0 by default, making it network-exposed.
An attacker with network access to the cloakserve port can delete arbitrary directories accessible to the service user.
Fixed in v0.3.28.
{
"github_reviewed_at": "2026-05-18T17:50:21Z",
"nvd_published_at": null,
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true
}