Impact
A use‑after‑free bug in Chrome’s TextEncoding component can corrupt the heap, allowing a remote attacker to potentially execute arbitrary code if the victim loads a crafted HTML page. The flaw leverages insecure memory handling identified as CWE‑416, and can compromise both confidentiality and integrity of the system running the browser. It is not a denial‑of‑service bug but may lead to full control over the user’s machine if exploited successfully.
Affected Systems
The vulnerability affects Google Chrome versions prior to 146.0.7680.71 on all supported operating systems, including macOS, Linux and Windows. The patch was released in the stable channel update for desktop browsers in March 2026, eliminating the issue in the new release.
Risk and Exploitability
The CVSS score of 8.8 classifies this vulnerability as high severity, yet the EPSS score is below 1% and it is not listed in the CISA KEV catalog, indicating a low current likelihood of exploitation. Nevertheless, a malicious website or email containing a specially crafted HTML document can target a user’s browser, making it a realistic, remote exploitation scenario. Because the flaw resides in client‑side code, any user who visits the malicious page under an unpatched Chrome installation is at risk.
OpenCVE Enrichment
Debian DSA