Description
Use after free in WebGPU in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Published: 2026-03-24
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Immediately
AI Analysis

Impact

A use‑after‑free bug in Chrome’s WebGPU implementation allows a crafted web page to run arbitrary code inside the browser’s sandbox. The flaw occurs when the GPU buffer is freed while still referenced, enabling an attacker to manipulate memory and trigger execution. This can lead to the execution of malicious code, which may be used for data exfiltration, credential theft, or further exploitation within the user’s session.

Affected Systems

The vulnerability affects Google Chrome versions earlier than 146.0.7680.165 on all major operating systems that run the browser, including Windows, macOS, and Linux. The affected component is the WebGPU feature inside the Chromium engine.

Risk and Exploitability

The flaw carries a CVSS score of 8.8, classifying it as high severity, but the EPSS score is below 1% and it is not listed in the CISA KEV catalog, suggesting low current exploitation prevalence. Attackers would need to entice a user to open a malicious webpage that leverages WebGPU, making the threat primarily a user‑initiated, remote execution scenario. Despite the low exploitation likelihood, the potential impact warrants immediate attention.

Generated by OpenCVE AI on March 24, 2026 at 19:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Chrome to version 146.0.7680.165 or later.
  • Verify that the browser reflects the updated build number.
  • If an upgrade is not immediately possible, consider disabling WebGPU via chrome://flags or applying an enterprise policy to block the feature.

Generated by OpenCVE AI on March 24, 2026 at 19:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6177-1 chromium security update
History

Tue, 24 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Tue, 24 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Title chromium-browser: Use after free in WebGPU
Weaknesses CWE-825
References
Metrics threat_severity

None

threat_severity

Important


Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description Use after free in WebGPU in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-03-25T03:55:37.921Z

Reserved: 2026-03-23T21:08:18.347Z

Link: CVE-2026-4678

cve-icon Vulnrichment

Updated: 2026-03-24T00:51:57.343Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T01:17:03.477

Modified: 2026-03-24T17:50:27.517

Link: CVE-2026-4678

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-23T00:00:00Z

Links: CVE-2026-4678 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:40:36Z

Weaknesses