CVE-2026-30834

PinchTab · PinchTab HTTP Server

PinchTab, an HTTP server for AI agents, contains a vulnerability that could allow for unauthorized control over Chrome browser instances.

Executive summary

A security flaw in the PinchTab HTTP server could allow attackers to hijack AI-driven browser sessions, leading to unauthorized data access or malicious browser activity.

Vulnerability

PinchTab is a standalone HTTP server designed to give AI agents control over Chrome. The vulnerability likely involves an authentication bypass or insecure API endpoint that allows an attacker to intercept or issue commands to the browser instance controlled by the AI.

Business impact

The CVSS score of 7.5 indicates a High severity. If exploited, an attacker could steal session cookies, access sensitive web accounts, or use the hijacked browser to perform actions on behalf of the user, resulting in a significant breach of privacy and potential financial loss.

Remediation

Immediate Action: Update the PinchTab server software to the latest version and ensure that all AI agent communication is encrypted and authenticated.

Proactive Monitoring: Monitor the HTTP server logs for unexpected connections or commands that do not originate from authorized AI agent sources.

Compensating Controls: Restrict access to the PinchTab HTTP server to the local host or a dedicated, secure management network using firewall rules.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The intersection of AI and browser control presents a unique security risk. It is imperative to apply the primary remediation immediately to prevent attackers from gaining control over automated browser sessions and the sensitive data they handle.