CVE-2026-30834
PinchTab · PinchTab HTTP Server
PinchTab, an HTTP server for AI agents, contains a vulnerability that could allow for unauthorized control over Chrome browser instances.
Executive summary
A security flaw in the PinchTab HTTP server could allow attackers to hijack AI-driven browser sessions, leading to unauthorized data access or malicious browser activity.
Vulnerability
PinchTab is a standalone HTTP server designed to give AI agents control over Chrome. The vulnerability likely involves an authentication bypass or insecure API endpoint that allows an attacker to intercept or issue commands to the browser instance controlled by the AI.
Business impact
The CVSS score of 7.5 indicates a High severity. If exploited, an attacker could steal session cookies, access sensitive web accounts, or use the hijacked browser to perform actions on behalf of the user, resulting in a significant breach of privacy and potential financial loss.
Remediation
Immediate Action: Update the PinchTab server software to the latest version and ensure that all AI agent communication is encrypted and authenticated.
Proactive Monitoring: Monitor the HTTP server logs for unexpected connections or commands that do not originate from authorized AI agent sources.
Compensating Controls: Restrict access to the PinchTab HTTP server to the local host or a dedicated, secure management network using firewall rules.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The intersection of AI and browser control presents a unique security risk. It is imperative to apply the primary remediation immediately to prevent attackers from gaining control over automated browser sessions and the sensitive data they handle.