Description
PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. PinchTab `v0.8.3` through `v0.8.5` allow arbitrary JavaScript execution through `POST /wait` and `POST /tabs/{id}/wait` when the request uses `fn` mode, even if `security.allowEvaluate` is disabled. `POST /evaluate` correctly enforces the `security.allowEvaluate` guard, which is disabled by default. However, in the affected releases, `POST /wait` accepted a user-controlled `fn` expression, embedded it directly into executable JavaScript, and evaluated it in the browser context without checking the same policy. This is a security-policy bypass rather than a separate authentication bypass. Exploitation still requires authenticated API access, but a caller with the server token can execute arbitrary JavaScript in a tab context even when the operator explicitly disabled JavaScript evaluation. The current worktree fixes this by applying the same policy boundary to `fn` mode in `/wait` that already exists on `/evaluate`, while preserving the non-code wait modes. As of time of publication, a patched version is not yet available.
Published: 2026-03-26
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary JavaScript execution
Action: Patch ASAP
AI Analysis

Impact

The affected PinchTab HTTP server versions 0.8.3 through 0.8.5 contain a security‑policy bypass that permits an authenticated user to execute arbitrary JavaScript in a Chrome tab by sending a POST /wait request with fn mode. The server directly embeds the user‑supplied fn expression into executable JavaScript and evaluates it in the browser context without honoring the security.allowEvaluate guard, which is disabled by default. This flaw effectively grants remote code execution capabilities within the controlled browser, exposing confidentiality, integrity, and availability of the system that runs the agent. The weakness aligns with CWE‑284, CWE‑693, and CWE‑94.

Affected Systems

The vulnerability affects the PinchTab product released as a standalone HTTP server, specifically versions 0.8.3 through 0.8.5. The functionality controlled by the API allows AI agents direct command over a Chrome browser, and the flaw exists in the handling of POST /wait and POST /tabs/{id}/wait when fn mode is used. The security.allowEvaluate setting remains disabled by default, but the policy bypass ignores this guard. No other vendors or versions are reported as affected, and the current source tree has been patched to enforce the same policy boundary on fn mode.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity, while the EPSS score of less than 1% suggests a low likelihood of exploitation at present. The vulnerability is not listed in CISA’s KEV catalog, reinforcing its relative novelty. Exploitation requires possession of an authenticated API token, so it cannot be leveraged through unauthenticated access. Nevertheless, once an attacker gains token access, they can inject and run malicious JavaScript inside the agent’s browser context. Until a public patch is released, the risk remains contingent on securing authentication credentials and monitoring for malicious activity.

Generated by OpenCVE AI on March 31, 2026 at 17:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the patched PinchTab version once it becomes available.
  • Ensure API tokens are stored securely and only issued to trusted users.
  • Restrict network access to the PinchTab API to trusted hosts or VPNs.
  • Keep an eye on the vendor’s security advisories for updates.

Generated by OpenCVE AI on March 31, 2026 at 17:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-w5pc-m664-r62v A PinchTab Security Policy Bypass in /wait Allows Arbitrary JavaScript Execution
History

Tue, 31 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:pinchtab:pinchtab:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Pinchtab
Pinchtab pinchtab
Vendors & Products Pinchtab
Pinchtab pinchtab

Thu, 26 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
Description PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. PinchTab `v0.8.3` through `v0.8.5` allow arbitrary JavaScript execution through `POST /wait` and `POST /tabs/{id}/wait` when the request uses `fn` mode, even if `security.allowEvaluate` is disabled. `POST /evaluate` correctly enforces the `security.allowEvaluate` guard, which is disabled by default. However, in the affected releases, `POST /wait` accepted a user-controlled `fn` expression, embedded it directly into executable JavaScript, and evaluated it in the browser context without checking the same policy. This is a security-policy bypass rather than a separate authentication bypass. Exploitation still requires authenticated API access, but a caller with the server token can execute arbitrary JavaScript in a tab context even when the operator explicitly disabled JavaScript evaluation. The current worktree fixes this by applying the same policy boundary to `fn` mode in `/wait` that already exists on `/evaluate`, while preserving the non-code wait modes. As of time of publication, a patched version is not yet available.
Title A PinchTab Security Policy Bypass in /wait Allows Arbitrary JavaScript Execution
Weaknesses CWE-284
CWE-693
CWE-94
References
Metrics cvssV4_0

{'score': 6.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:H/SI:N/SA:N'}


Subscriptions

Pinchtab Pinchtab
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-27T20:20:00.663Z

Reserved: 2026-03-23T14:24:11.617Z

Link: CVE-2026-33622

cve-icon Vulnrichment

Updated: 2026-03-27T20:19:57.398Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T21:17:06.780

Modified: 2026-03-31T16:11:45.657

Link: CVE-2026-33622

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:08:39Z

Weaknesses