Description
Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
Published: 2026-04-01
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A use‑after‑free flaw exists in the Dawn rendering engine of Google Chrome, which allows an attacker who has already compromised the renderer process to run arbitrary code. The vulnerability is triggered by a specially crafted HTML page and is classified as high severity in Chromium’s own ranking.

Affected Systems

The flaw affects Google Chrome versions prior to 146.0.7680.178. It is present on all major operating systems supported by Chrome, including macOS, Linux, and Windows, as the vulnerability resides in the shared rendering component rather than a platform‑specific module.

Risk and Exploitability

The CVSS score of 7.5 indicates a high impact if exploited, but the EPSS score of less than 1% suggests a low expected exploitation rate. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires that the attacker can influence or already control the renderer process, which is generally isolated from the main browser process, so while the potential damage is significant, the likelihood of a real‑world attack remains modest.

Generated by OpenCVE AI on April 2, 2026 at 04:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 146.0.7680.178 or newer.
  • If an immediate upgrade is not feasible, isolate or sandbox renderer processes to minimize privilege levels.
  • Apply strict content‑security policies to limit the execution of arbitrary scripts in web pages.
  • Monitor for suspicious activity in renderer processes and investigate any anomalous behavior promptly.

Generated by OpenCVE AI on April 2, 2026 at 04:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6192-1 chromium security update
History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Title chromium-browser: Use after free in Dawn
First Time appeared Apple
Apple macos
Google
Google chrome
Linux
Linux linux Kernel
Microsoft
Microsoft windows
Weaknesses CWE-825
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Google
Google chrome
Linux
Linux linux Kernel
Microsoft
Microsoft windows
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

threat_severity

Important


Wed, 01 Apr 2026 05:00:00 +0000

Type Values Removed Values Added
Description Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-02T03:55:43.158Z

Reserved: 2026-03-31T20:07:14.065Z

Link: CVE-2026-5284

cve-icon Vulnrichment

Updated: 2026-04-01T13:22:22.042Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T05:16:01.817

Modified: 2026-04-01T17:09:14.033

Link: CVE-2026-5284

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-31T00:00:00Z

Links: CVE-2026-5284 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:18:17Z

Weaknesses