Playwright MCP server
An MCP server that provides browser automation capabilities using Playwright. It enables LLMs to interact with web pages through structured accessibility snapshots without needing screenshots or vision models. Fast, lightweight, and deterministic.
Is it safe?
No known CVEs for @playwright/mcp. 1 previously resolved.
No authentication — any process on your machine can connect to this server.
Apache-2.0. View license →
Last scanned 0 days ago.
Is it maintained?
Last commit 0 days ago. 30,178 GitHub stars. 2,752,214 weekly downloads.
Will it work with my client?
Transport: stdio, sse, http. Works with claude-desktop, cursor, claude-code, windsurf.
How much context will it use?
21 tools. Estimated ~3,600 tokens of your context window (1.8% of 200K). Consider loading selectively — this is a heavy server.
What if it doesn't work?
Common issues: JSON syntax errors in config, wrong Node.js version, npx cache, network or firewall blocking. Setup guide covers troubleshooting. Or check GitHub issues for known problems.
{
"mcpServers": {
"playwright": {
"args": [
"@playwright/mcp@latest"
],
"command": "npx"
}
}
}This server supports HTTP transport. Be the first to test it — help the community know if it works.
browser_closeClose the page
browser_resizeResize the browser window
browser_console_messagesReturns all console messages
browser_handle_dialogHandle a dialog
browser_evaluateEvaluate JavaScript expression on page or element
browser_file_uploadUpload one or multiple files
browser_fill_formFill multiple form fields
browser_press_keyPress a key on the keyboard
browser_typeType text into editable element
browser_navigateNavigate to a URL
Last scanned 1h ago
No open vulnerabilities. 1 fixed CVE.
CVE-2025-9611FixedMicrosoft Playwright MCP Server vulnerable to DNS Rebinding Attack; Allows Attackers Access to All Server Tools
Microsoft Playwright MCP Server versions prior to 0.0.40 fails to validate the Origin header on incoming connections. This allows an attacker to perform a DNS rebinding attack via a victim’s web browser and send unauthorized requests to a locally running MCP server, resulting in unintended invocation of MCP tool endpoints.
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.