Description
Use after free in FedCM in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Published: 2026-03-24
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution inside Browser Sandbox
Action: Immediate Patch
AI Analysis

Impact

A use‑after‑free bug within the FedCM component of Google Chrome allows an attacker to execute arbitrary code confined to the browser’s sandbox. The flaw can be triggered through a specially crafted web page, leading to unauthorized code execution inside the sandboxed environment. No information in the CVE statement indicates that the attacker can escape beyond the sandbox to system‑level privileges; the impact is limited to the sandbox boundaries.

Affected Systems

The vulnerability affects any installation of Google Chrome with a build number earlier than 146.0.7680.165. The CVE description does not specify supported operating systems, but since Google Chrome runs on Windows, macOS, and Linux, users of those platforms using affected versions are potentially exposed.

Risk and Exploitability

The CVSS score of 8.8 classifies this flaw as high risk. The EPSS value of less than 1% indicates a low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is a malicious web page that the victim visits, which triggers the use‑after‑free during a FedCM operation. The flaw requires only user interaction and a vulnerable browser version to be exploited.

Generated by OpenCVE AI on March 24, 2026 at 20:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 146.0.7680.165 or later.

Generated by OpenCVE AI on March 24, 2026 at 20:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6177-1 chromium security update
History

Tue, 24 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Tue, 24 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Title chromium-browser: Use after free in FedCM
Weaknesses CWE-825
References
Metrics threat_severity

None

threat_severity

Important


Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description Use after free in FedCM in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-03-25T03:55:36.575Z

Reserved: 2026-03-23T21:08:18.895Z

Link: CVE-2026-4680

cve-icon Vulnrichment

Updated: 2026-03-24T00:50:06.593Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T01:17:03.743

Modified: 2026-03-24T17:50:13.317

Link: CVE-2026-4680

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-23T00:00:00Z

Links: CVE-2026-4680 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:40:34Z

Weaknesses