Description
Use after free in PrivateAI in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-04-08
Score: 9.6 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Sandbox escape
Action: Immediate patch
AI Analysis

Impact

An use‑after‑free flaw in the PrivateAI component of Google Chrome allows a remote attacker to potentially escape the renderer sandbox by delivering a specially crafted HTML page that prompts the user to perform particular UI gestures. If the vulnerability is triggered, the attacker could obtain the privileges of the Chrome process and potentially execute arbitrary code with the same rights as the user. This weakness is a classic memory corruption issue that permits unauthorized memory access and control flow hijacking.

Affected Systems

Google Chrome versions prior to 147.0.7727.55 on Windows, macOS, and Linux are affected. The flaw is present in all desktop editions of the browser and specifically targets the PrivateAI functionality used across these operating systems.

Risk and Exploitability

With a CVSS score of 9.6, the bug represents a very high risk if exploited. The exploit probability is currently very low (EPSS < 1 %) and the vulnerability is not listed in the KEV catalog, indicating no known exploitation in the wild. However, the requirement for user interaction through a crafted web page makes social engineering a viable attack path. The potential impact of escaping the sandbox to reach full system compromise means the risk remains significant if a determined adversary can deliver the malicious page and persuade a user to comply.

Generated by OpenCVE AI on April 13, 2026 at 19:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to version 147.0.7727.55 or later
  • Avoid engaging with unexpected or suspicious web pages that request unusual UI gestures
  • Keep the operating system and all security software up to date

Generated by OpenCVE AI on April 13, 2026 at 19:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6205-1 chromium security update
History

Mon, 13 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Sat, 11 Apr 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Title Use‑after‑free in Chrome PrivateAI Allows Sandbox Escape Google Chrome: Chromium: Google Chrome: Sandbox escape via use-after-free in PrivateAI
Weaknesses CWE-825
References
Metrics threat_severity

None

cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}

threat_severity

Important


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
Title Use‑after‑free in Chrome PrivateAI Allows Sandbox Escape
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 08 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Description Use after free in PrivateAI in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-11T02:59:10.879Z

Reserved: 2026-04-08T19:34:36.131Z

Link: CVE-2026-5874

cve-icon Vulnrichment

Updated: 2026-04-11T02:59:04.201Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T22:16:27.003

Modified: 2026-04-13T17:57:38.287

Link: CVE-2026-5874

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-08T21:20:46Z

Links: CVE-2026-5874 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:37:54Z

Weaknesses