CVE-2026-33081

PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. Versions 0.8.2 and below have a Blind SSRF vulnerability in the /download endpoint. The validateDownloadURL() function only checks the initial user-supplied URL, but the embedded Chromium browser can follow attacker-controlled redirects/navigations to internal network addresses after validation. Exploitation requires security.allowDownload=true (disabled by default), limiting real-world impact. An attacker-controlled page can use JavaScript redirects or resource requests to make the browser reach internal services from the PinchTab host, resulting in a blind Server-Side Request Forgery (SSRF) condition against internal-only services. The issue has been patched in version 0.8.3.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pinchtab:pinchtab:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-20 10:16

Updated : 2026-03-23 15:46


NVD link : CVE-2026-33081

Mitre link : CVE-2026-33081

CVE.ORG link : CVE-2026-33081


JSON object : View

Products Affected

pinchtab

  • pinchtab
CWE
CWE-918

Server-Side Request Forgery (SSRF)