Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-w5pc-m664-r62v | A PinchTab Security Policy Bypass in /wait Allows Arbitrary JavaScript Execution |
Tue, 31 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:pinchtab:pinchtab:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Sat, 28 Mar 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pinchtab
Pinchtab pinchtab |
|
| Vendors & Products |
Pinchtab
Pinchtab pinchtab |
Thu, 26 Mar 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. PinchTab `v0.8.3` through `v0.8.5` allow arbitrary JavaScript execution through `POST /wait` and `POST /tabs/{id}/wait` when the request uses `fn` mode, even if `security.allowEvaluate` is disabled. `POST /evaluate` correctly enforces the `security.allowEvaluate` guard, which is disabled by default. However, in the affected releases, `POST /wait` accepted a user-controlled `fn` expression, embedded it directly into executable JavaScript, and evaluated it in the browser context without checking the same policy. This is a security-policy bypass rather than a separate authentication bypass. Exploitation still requires authenticated API access, but a caller with the server token can execute arbitrary JavaScript in a tab context even when the operator explicitly disabled JavaScript evaluation. The current worktree fixes this by applying the same policy boundary to `fn` mode in `/wait` that already exists on `/evaluate`, while preserving the non-code wait modes. As of time of publication, a patched version is not yet available. | |
| Title | A PinchTab Security Policy Bypass in /wait Allows Arbitrary JavaScript Execution | |
| Weaknesses | CWE-284 CWE-693 CWE-94 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-27T20:20:00.663Z
Reserved: 2026-03-23T14:24:11.617Z
Link: CVE-2026-33622
Updated: 2026-03-27T20:19:57.398Z
Status : Analyzed
Published: 2026-03-26T21:17:06.780
Modified: 2026-03-31T16:11:45.657
Link: CVE-2026-33622
No data.
OpenCVE Enrichment
Updated: 2026-03-31T20:08:39Z
Github GHSA