Description
Insufficient validation of untrusted input in Navigation in Google Chrome prior to 146.0.7680.153 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Published: 2026-03-20
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch
AI Analysis

Impact

Insufficient input validation in Chrome’s navigation handling allows a remote attacker who has already compromised the renderer process to escape the browser’s sandbox by loading a specially crafted HTML page. The flaw is characterized by input validation weaknesses (CWE‑1286 and CWE‑20) and can lead to unauthorized execution of code with system‑level privileges. The official remark labels the issue as Chromium security severity High.

Affected Systems

Google Chrome browsers prior to version 146.0.7680.153 on all supported operating systems (Windows, macOS, Linux).

Risk and Exploitability

The CVSS base score of 8.8 indicates a high likelihood of severe exploitation, while the EPSS score of less than 1% suggests that active exploitation is currently unlikely but possible. The vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog, and it requires a remote attacker to have already gained control of the renderer process, typically through malicious web content. Once inside the renderer, the attacker can escape the sandbox and execute arbitrary code on the host system.

Generated by OpenCVE AI on March 20, 2026 at 19:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 146.0.7680.153 or later.

Generated by OpenCVE AI on March 20, 2026 at 19:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6171-1 chromium security update
History

Fri, 20 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Fri, 20 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Fri, 20 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Title Chrome Remote Sandbox Escape via Navigation Validation chromium-browser: Insufficient validation of untrusted input in Navigation
Weaknesses CWE-1286
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}

threat_severity

Important


Fri, 20 Mar 2026 11:15:00 +0000

Type Values Removed Values Added
Title Chrome Remote Sandbox Escape via Navigation Validation

Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Fri, 20 Mar 2026 02:15:00 +0000

Type Values Removed Values Added
Description Insufficient validation of untrusted input in Navigation in Google Chrome prior to 146.0.7680.153 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-20
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-03-21T04:01:35.411Z

Reserved: 2026-03-19T20:23:51.121Z

Link: CVE-2026-4451

cve-icon Vulnrichment

Updated: 2026-03-20T14:23:59.555Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T02:16:38.063

Modified: 2026-03-20T18:05:44.367

Link: CVE-2026-4451

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-18T00:00:00Z

Links: CVE-2026-4451 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:09:54Z

Weaknesses