Description
PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. PinchTab `v0.8.4` contains a Windows-only command injection issue in the orphaned Chrome cleanup path. When an instance is stopped, the Windows cleanup routine builds a PowerShell `-Command` string using a `needle` derived from the profile path. In `v0.8.4`, that string interpolation escapes backslashes but does not safely neutralize other PowerShell metacharacters. If an attacker can launch an instance using a crafted profile name and then trigger the cleanup path, they may be able to execute arbitrary PowerShell commands on the Windows host in the security context of the PinchTab process user. This is not an unauthenticated internet RCE. It requires authenticated, administrative-equivalent API access to instance lifecycle endpoints, and the resulting command execution inherits the permissions of the PinchTab OS user rather than bypassing host privilege boundaries. Version 0.8.5 contains a patch for the issue.
Published: 2026-03-26
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary Command Execution
Action: Patch
AI Analysis

Impact

PinchTab, a standalone HTTP server that lets AI agents control a Chrome browser, contains a Windows‑only command injection flaw in its orphaned Chrome cleanup routine. When a user instance is stopped, the cleanup path builds a PowerShell‐Command string from the supplied profile path. In version 0.8.4 the code escapes backslashes but does not neutralize other PowerShell metacharacters, allowing an attacker to inject custom commands. The flaw permits execution of arbitrary PowerShell code under the operating system account that runs the PinchTab process. It is not a publicly exposed internet RCE; an attacker must first have authenticated, administrative‑equivalent API access to instance lifecycle endpoints and then launch an instance with a malicious profile name before triggering the cleanup step. The vulnerability carries a CVSS score of 6.7 (medium) and has a low EPSS probability of less than 1 %. It is not listed in the CISA KEV catalog. While exploitation requires privileged API access, the potential impact is significant within a compromised environment, as any injected PowerShell commands would execute with the PinchTab OS user’s privileges.

Affected Systems

The affected product is PinchTab’s standalone HTTP server, specifically version 0.8.4. The issue is limited to Windows platforms and has been addressed in version 0.8.5, which includes the necessary input sanitization. No other vendors or product variants are reported affected by this item. Users operating PinchTab v0.8.4 on Windows should be aware of this vulnerability and plan an upgrade. The problem is confined to the cleanup process; other functionalities of PinchTab are not directly impacted.

Risk and Exploitability

Exploiting the injection requires three steps: obtain privileged API access, create an instance with a crafted profile name, then stop the instance to trigger the cleanup routine. Once executed, the injected command runs under the PinchTab process user, which could be an elevated account if the service is configured with administrative rights. Because the CVSS score is moderate and the EPSS is low, widespread exploitation is unlikely, but within a trusted network the risk is significant. The lack of a public internet RCE vector mitigates some exposure, yet internal attackers remain able to compromise the host through this flaw.

Generated by OpenCVE AI on March 31, 2026 at 17:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update PinchTab to version 0.8.5 or later, which sanitizes profile names in the cleanup command path.

Generated by OpenCVE AI on March 31, 2026 at 17:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-p8mm-644p-phmh PinchTab: OS Command Injection via Profile Name in Windows Cleanup Routine Enables Arbitrary Command Execution
History

Tue, 31 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:pinchtab:pinchtab:*:*:*:*:*:*:*:*

Fri, 27 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Pinchtab
Pinchtab pinchtab
Vendors & Products Pinchtab
Pinchtab pinchtab

Thu, 26 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Description PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. PinchTab `v0.8.4` contains a Windows-only command injection issue in the orphaned Chrome cleanup path. When an instance is stopped, the Windows cleanup routine builds a PowerShell `-Command` string using a `needle` derived from the profile path. In `v0.8.4`, that string interpolation escapes backslashes but does not safely neutralize other PowerShell metacharacters. If an attacker can launch an instance using a crafted profile name and then trigger the cleanup path, they may be able to execute arbitrary PowerShell commands on the Windows host in the security context of the PinchTab process user. This is not an unauthenticated internet RCE. It requires authenticated, administrative-equivalent API access to instance lifecycle endpoints, and the resulting command execution inherits the permissions of the PinchTab OS user rather than bypassing host privilege boundaries. Version 0.8.5 contains a patch for the issue.
Title PinchTab: OS Command Injection via Profile Name in Windows Cleanup Routine Enables Arbitrary Command Execution
Weaknesses CWE-400
CWE-78
References
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L'}


Subscriptions

Pinchtab Pinchtab
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-27T20:01:25.733Z

Reserved: 2026-03-23T14:24:11.617Z

Link: CVE-2026-33623

cve-icon Vulnrichment

Updated: 2026-03-27T19:51:34.295Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T21:17:06.950

Modified: 2026-03-31T16:03:21.250

Link: CVE-2026-33623

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:08:38Z

Weaknesses