Description
PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. Prior to version 0.7.7, a Server-Side Request Forgery (SSRF) vulnerability in the /download endpoint allows any user with API access to induce the PinchTab server to make requests to arbitrary URLs, including internal network services and local system files, and exfiltrate the full response content. This issue has been patched in version 0.7.7.
Published: 2026-03-07
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Full response exfiltration through SSRF in the /download endpoint
Action: Immediate Patch
AI Analysis

Impact

PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. The /download endpoint contains a server‑side request forgery weakness that allows any user who has API access to instruct the PinchTab server to make arbitrary HTTP requests. The server then returns the full response body to the attacker, enabling extraction of internal network data, local system files, or other sensitive resources. This flaw predominantly results in accidental or intentional confidentiality violations and could be used to surface sensitive information without authentication to the server itself.

Affected Systems

The vulnerability is present in PinchTab version 0.7.6 and earlier, a range inferred from the description that the issue was patched in 0.7.7. The affected product is PinchTab as identified by the vendor pinchtab:pinchtab.

Risk and Exploitability

The CVSS score of 7.5 places this flaw in the high severity range, but the EPSS value of less than 1% indicates a very low probability of exploitation at present. The flaw is not listed in the CISA KEV catalog. Exploitation requires only API access, meaning that any user who can reach the PinchTab instance (for example, via a network or exposed API key) can trigger SSRF requests. The attacker can direct the server to any URL, including internal addresses and local file URLs, and retrieve the full content of the response. No additional preconditions are needed beyond API access, and the attacker can exploit the issue immediately without further setup.

Generated by OpenCVE AI on April 18, 2026 at 17:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update PinchTab to version 0.7.7 or later, which contains the SSRF fix.
  • Restrict API access to trusted users or network segments to limit the ability to trigger SSRF requests.
  • If the patch cannot be applied immediately, temporarily disable or remove the /download endpoint or configure it to block internal or file URLs.

Generated by OpenCVE AI on April 18, 2026 at 17:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rw8p-c6hf-q3pg PinchTab has SSRF with Full Response Exfiltration via Download Handler
History

Wed, 11 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:pinchtab:pinchtab:*:*:*:*:*:*:*:*

Tue, 10 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Pinchtab
Pinchtab pinchtab
Vendors & Products Pinchtab
Pinchtab pinchtab

Sat, 07 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
Description PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. Prior to version 0.7.7, a Server-Side Request Forgery (SSRF) vulnerability in the /download endpoint allows any user with API access to induce the PinchTab server to make requests to arbitrary URLs, including internal network services and local system files, and exfiltrate the full response content. This issue has been patched in version 0.7.7.
Title PinchTab: SSRF with Full Response Exfiltration via Download Handler
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Pinchtab Pinchtab
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-10T17:30:48.858Z

Reserved: 2026-03-05T21:06:44.606Z

Link: CVE-2026-30834

cve-icon Vulnrichment

Updated: 2026-03-10T17:30:44.088Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-07T16:15:56.057

Modified: 2026-03-11T20:30:51.027

Link: CVE-2026-30834

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T17:30:05Z

Weaknesses