PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. Prior to version 0.7.7, a Server-Side Request Forgery (SSRF) vulnerability in the /download endpoint allows any user with API access to induce the PinchTab server to make requests to arbitrary URLs, including internal network services and local system files, and exfiltrate the full response content. This issue has been patched in version 0.7.7.
References
| Link | Resource |
|---|---|
| https://github.com/pinchtab/pinchtab/security/advisories/GHSA-rw8p-c6hf-q3pg | Exploit Vendor Advisory |
Configurations
History
11 Mar 2026, 20:30
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Pinchtab
Pinchtab pinchtab |
|
| Summary |
|
|
| References | () https://github.com/pinchtab/pinchtab/security/advisories/GHSA-rw8p-c6hf-q3pg - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:pinchtab:pinchtab:*:*:*:*:*:*:*:* |
07 Mar 2026, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-07 16:15
Updated : 2026-03-11 20:30
NVD link : CVE-2026-30834
Mitre link : CVE-2026-30834
CVE.ORG link : CVE-2026-30834
JSON object : View
Products Affected
pinchtab
- pinchtab
CWE
CWE-918
Server-Side Request Forgery (SSRF)
