Breaking changes
-
To prevent malicious web servers from reading arbitrary files from the client, files must now be opened explicitly by the user in order to upload their contents in form submission. For example, instead of:
browser["upload"] = "/path/to/file"
you would now use:
browser["upload"] = open("/path/to/file", "rb")
This remediates CVE-2023-34457. Our thanks to @e-c-d for reporting and helping to fix the vulnerability!