Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-33622
March 26, 2026
PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. PinchTab "v0.8.3" through "v0.8.5" allow arbitrary JavaScript execution through "POST /wait" and "POST /tabs/{id}/wait" when the request uses "fn" mode, even if "security.allowEvaluate" is disabled. "POST /evaluate" correctly enforces the "security.allowEvaluate" guard, which is disabled by default. However, in the affected releases, "POST /wait" accepted a user-controlled "fn" expression, embedded it directly into executable JavaScript, and evaluated it in the browser context without checking the same policy. This is a security-policy bypass rather than a separate authentication bypass. Exploitation still requires authenticated API access, but a caller with the server token can execute arbitrary JavaScript in a tab context even when the operator explicitly disabled JavaScript evaluation. The current worktree fixes this by applying the same policy boundary to "fn" mode in "/wait" that already exists on "/evaluate", while preserving the non-code wait modes. As of time of publication, a patched version is not yet available.
Do you need more information?
Contact Us
CVSS v4
Base Score:
6.1
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
HIGH
User Interaction
NONE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
HIGH
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
5.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
Protection Mechanism Failure
Improper Access Control
Improper Control of Generation of Code ('Code Injection')
EPSS
Base Score:
0.10