CVE-2026-33622
March 26, 2026
PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. PinchTab "v0.8.3" through "v0.8.5" allow arbitrary JavaScript execution through "POST /wait" and "POST /tabs/{id}/wait" when the request uses "fn" mode, even if "security.allowEvaluate" is disabled. "POST /evaluate" correctly enforces the "security.allowEvaluate" guard, which is disabled by default. However, in the affected releases, "POST /wait" accepted a user-controlled "fn" expression, embedded it directly into executable JavaScript, and evaluated it in the browser context without checking the same policy. This is a security-policy bypass rather than a separate authentication bypass. Exploitation still requires authenticated API access, but a caller with the server token can execute arbitrary JavaScript in a tab context even when the operator explicitly disabled JavaScript evaluation. The current worktree fixes this by applying the same policy boundary to "fn" mode in "/wait" that already exists on "/evaluate", while preserving the non-code wait modes. As of time of publication, a patched version is not yet available.
Related ResourcesĀ (3)
Do you need more information?
Contact UsCVSS v4
Base Score:
6.1
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
HIGH
User Interaction
NONE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
HIGH
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
5.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
EPSS
Base Score:
0.10