Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qwxp-6qf9-wr4m | PinchTab has a Blind SSRF via browser-side redirect bypass in /download URL validation |
Mon, 23 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:pinchtab:pinchtab:*:*:*:*:*:*:*:* |
Fri, 20 Mar 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pinchtab
Pinchtab pinchtab |
|
| Vendors & Products |
Pinchtab
Pinchtab pinchtab |
Fri, 20 Mar 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. Versions 0.8.2 and below have a Blind SSRF vulnerability in the /download endpoint. The validateDownloadURL() function only checks the initial user-supplied URL, but the embedded Chromium browser can follow attacker-controlled redirects/navigations to internal network addresses after validation. Exploitation requires security.allowDownload=true (disabled by default), limiting real-world impact. An attacker-controlled page can use JavaScript redirects or resource requests to make the browser reach internal services from the PinchTab host, resulting in a blind Server-Side Request Forgery (SSRF) condition against internal-only services. The issue has been patched in version 0.8.3. | |
| Title | PinchTab has Blind SSRF via browser-side redirect bypass in /download URL validation | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T21:20:23.968Z
Reserved: 2026-03-17T19:27:06.345Z
Link: CVE-2026-33081
Updated: 2026-03-20T21:20:19.630Z
Status : Analyzed
Published: 2026-03-20T10:16:18.563
Modified: 2026-03-23T15:46:32.153
Link: CVE-2026-33081
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:29:44Z
Github GHSA