Description
Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Published: 2026-03-20
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a heap buffer overflow within the Chromium WebAudio engine. A remote attacker can send a specially crafted HTML page to a user running an affected version of Google Chrome, triggering code execution inside the browser’s sandbox. This flaw is classified as a buffer overflow, mapping to CWE‑120 and CWE‑122. The compromised sandbox can lead an attacker to achieve arbitrary code execution with the privileges of the browser context, potentially escalating privileges or exfiltrating data if further sandbox escape is possible.

Affected Systems

The affected product is Google Chrome for all major desktop platforms. Versions prior to 146.0.7680.153 are vulnerable. This includes installations on Windows, macOS, and Linux, as identified by the CPE entries. Users running any of these older releases need to upgrade to a patched build.

Risk and Exploitability

The severity rating is CVSS 8.8, indicating high impact. The EPSS probability is less than 1%, suggesting limited known exploitation activity. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires a user to load a malicious webpage in Chrome; the attack vector is remote through a crafted HTML page. No special prerequisites beyond browsing the attacker‑controlled site are required.

Generated by OpenCVE AI on March 20, 2026 at 20:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 146.0.7680.153 or later.
  • Verify that the installed Chrome version has been updated and the vulnerability is remediated.

Generated by OpenCVE AI on March 20, 2026 at 20:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6171-1 chromium security update
History

Fri, 20 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Fri, 20 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Fri, 20 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Title Heap Buffer Overflow in Chrome WebAudio Allows Remote Code Execution chromium-browser: Heap buffer overflow in WebAudio
Weaknesses CWE-120
References
Metrics threat_severity

None

cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}

threat_severity

Important


Fri, 20 Mar 2026 11:15:00 +0000

Type Values Removed Values Added
Title Heap Buffer Overflow in Chrome WebAudio Allows Remote Code Execution

Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Fri, 20 Mar 2026 02:15:00 +0000

Type Values Removed Values Added
Description Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-122
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-03-21T04:01:32.995Z

Reserved: 2026-03-19T20:23:48.877Z

Link: CVE-2026-4443

cve-icon Vulnrichment

Updated: 2026-03-20T14:35:06.865Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T02:16:36.930

Modified: 2026-03-20T19:32:00.640

Link: CVE-2026-4443

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-18T00:00:00Z

Links: CVE-2026-4443 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:10:03Z

Weaknesses