Impact
A use‑after‑free flaw in the navigation logic of Google Chrome allows an attacker who has already compromised the renderer process to escape the sandbox. The exploitation vector is a crafted HTML page that triggers the vulnerability, potentially enabling an attacker to execute arbitrary code with kernel privileges. The weakness is a classic use‑after‑free, variant of CWE‑416, and carries the full impact of a remote code execution on the affected system.
Affected Systems
Google Chrome browsers prior to version 146.0.7680.178 on Windows, macOS, and Linux platforms are affected. The flaw exists in the renderer process and is present across all supported operating systems.
Risk and Exploitability
The CVSS score of 9.6 indicates high severity, but the EPSS score of less than 1% suggests low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog, implying no known widespread exploitation. An attacker would need to deliver a malicious HTML page to a compromised renderer process, which means the threat is most relevant for users who have already been partially compromised or who inadvertently load untrusted content.
OpenCVE Enrichment
Debian DSA