{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T16:09:50.175","vulnerabilities":[{"cve":{"id":"CVE-2026-33623","sourceIdentifier":"security-advisories@github.com","published":"2026-03-26T21:17:06.950","lastModified":"2026-03-31T16:03:21.250","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. PinchTab `v0.8.4` contains a Windows-only command injection issue in the orphaned Chrome cleanup path. When an instance is stopped, the Windows cleanup routine builds a PowerShell `-Command` string using a `needle` derived from the profile path. In `v0.8.4`, that string interpolation escapes backslashes but does not safely neutralize other PowerShell metacharacters. If an attacker can launch an instance using a crafted profile name and then trigger the cleanup path, they may be able to execute arbitrary PowerShell commands on the Windows host in the security context of the PinchTab process user. This is not an unauthenticated internet RCE. It requires authenticated, administrative-equivalent API access to instance lifecycle endpoints, and the resulting command execution inherits the permissions of the PinchTab OS user rather than bypassing host privilege boundaries. Version 0.8.5 contains a patch for the issue."},{"lang":"es","value":"PinchTab es un servidor HTTP autónomo que otorga a los agentes de IA control directo sobre un navegador Chrome. PinchTab 'v0.8.4' contiene un problema de inyección de comandos solo para Windows en la ruta de limpieza de Chrome huérfano. Cuando una instancia se detiene, la rutina de limpieza de Windows construye una cadena de PowerShell '-Command' usando una 'needle' derivada de la ruta del perfil. En 'v0.8.4', esa interpolación de cadena escapa las barras invertidas pero no neutraliza de forma segura otros metacaracteres de PowerShell. Si un atacante puede lanzar una instancia usando un nombre de perfil manipulado y luego activar la ruta de limpieza, podrían ejecutar comandos arbitrarios de PowerShell en el host de Windows en el contexto de seguridad del usuario del proceso de PinchTab. Esto no es una RCE de internet no autenticada. Requiere acceso a la API autenticado y equivalente a administrador a los puntos finales del ciclo de vida de la instancia, y la ejecución de comandos resultante hereda los permisos del usuario del SO de PinchTab en lugar de eludir los límites de privilegios del host. La versión 0.8.5 contiene un parche para el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":1.2,"impactScore":5.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"},{"lang":"en","value":"CWE-400"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:pinchtab:pinchtab:*:*:*:*:*:*:*:*","versionEndExcluding":"0.8.5","matchCriteriaId":"9E159A6D-501A-450C-98AC-61DF18CF18F7"}]}]}],"references":[{"url":"https://github.com/pinchtab/pinchtab/commit/25b3374bdcdf0dad32c44d5d726bf953238cd8bd","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/pinchtab/pinchtab/security/advisories/GHSA-p8mm-644p-phmh","source":"security-advisories@github.com","tags":["Exploit","Mitigation","Vendor Advisory"]},{"url":"https://github.com/pinchtab/pinchtab/security/advisories/GHSA-p8mm-644p-phmh","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Mitigation","Vendor Advisory"]}]}}]}