Description
Incorrect security UI in Split View in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
Published: 2026-01-20
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: UI Spoofing via Crafted HTML
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is found in Google Chrome’s Split View UI where security indicators are rendered incorrectly. A remote attacker can deliver a crafted HTML page that, when opened in a Chrome instance before version 144.0.7559.59, causes the browser to display a spoofed security badge or icon that misleads the user into believing the site is protected. This deception facilitates phishing or credential theft by tricking users into submitting sensitive information. The flaw originates from insufficient validation of UI elements within Split View and is classified as CWE‑451.

Affected Systems

All desktop installations of Google Chrome running a version earlier than 144.0.7559.59 on Windows, macOS, or Linux are affected. The issue is tied to the stable channel and applies to users who have not updated Chrome after the January 2026 release cycle.

Risk and Exploitability

The CVSS score of 9.8 designates this bug as critical; however, the current EPSS score is less than 1 %, indicating a low probability of exploitation at this time. It is not listed in the CISA KEV catalog, so no widespread public exploitation is documented. Nevertheless, the attack vector is a malicious web page loaded in the browser, which is trivial for an attacker to craft and distribute over the internet, making the vulnerability highly actionable for anyone who can serve such a page to a user.

Generated by OpenCVE AI on April 18, 2026 at 04:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 144.0.7559.59 or newer using the browser’s automatic update mechanism or by downloading the latest stable release from Google’s site.
  • If enterprise policy allows, disable or restrict the Split View feature, which removes the UI context that allows the attack surface to be exploited.
  • Ensure that any extensions or third‑party software that modify Chrome’s UI are updated or disabled, as these can interfere with security indicators and may amplify the spoofing effect.

Generated by OpenCVE AI on April 18, 2026 at 04:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6100-1 chromium security update
History

Thu, 29 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Wed, 21 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Title chromium-browser: Incorrect security UI in Split View
References
Metrics threat_severity

None

threat_severity

Low


Tue, 20 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-451
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Tue, 20 Jan 2026 04:30:00 +0000

Type Values Removed Values Added
Description Incorrect security UI in Split View in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-01-20T14:37:38.272Z

Reserved: 2026-01-13T18:20:18.301Z

Link: CVE-2026-0907

cve-icon Vulnrichment

Updated: 2026-01-20T14:37:26.728Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-20T05:16:16.217

Modified: 2026-01-29T20:27:46.380

Link: CVE-2026-0907

cve-icon Redhat

Severity : Low

Publid Date: 2026-01-13T00:00:00Z

Links: CVE-2026-0907 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:00:06Z

Weaknesses