Description
Inappropriate implementation in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Published: 2026-04-08
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A flaw in the V8 JavaScript engine of Google Chrome allows a remote attacker to run arbitrary code inside the browser sandbox by serving a specially crafted HTML page. The vulnerability enables the attacker to inject malicious input that the engine processes incorrectly, leading to execution of code that would normally be confined to the sandbox. If exploited, the attacker can compromise confidentiality, integrity, or availability of the affected system and potentially pivot to other resources. Based on the description the weakness appears to be a failure to validate or handle input safely during script execution.

Affected Systems

Google Chrome browsers running versions prior to 147.0.7727.55 are impacted. Users of any operating system that hosts this browser version are vulnerable.

Risk and Exploitability

The vulnerability is graded as high severity by Chromium. No EPSS score is published, and it is not listed in the CISA KEV catalog. Exploitation requires only that an attacker deliver a crafted HTML page to the victim, implying the attack vector is remote and can be triggered normally over the web or via email. Because the flaw is in core engine code, successful exploitation leads to full code execution within the sandbox, potentially allowing out-of-sandbox escape through further bugs. The risk is significant for systems with unpatched Chrome installations.

Generated by OpenCVE AI on April 8, 2026 at 22:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Chrome update, at least version 147.0.7727.55 or newer. If immediate update is not possible, isolate the browser from untrusted content using a trusted network boundary or web filtering to block the crafted pages. Maintain the browser in the highest security configuration and monitor official channels for patches.

Generated by OpenCVE AI on April 8, 2026 at 22:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6205-1 chromium security update
History

Fri, 10 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title chromium-browser: Inappropriate implementation in V8
Weaknesses CWE-130
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

threat_severity

Important


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 08 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Description Inappropriate implementation in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-10T03:55:41.153Z

Reserved: 2026-04-08T19:34:32.627Z

Link: CVE-2026-5862

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-08T22:16:25.720

Modified: 2026-04-08T22:16:25.720

Link: CVE-2026-5862

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-07T00:00:00Z

Links: CVE-2026-5862 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:27:04Z

Weaknesses