Impact
A use‑after‑free error occurs during navigation in Google Chrome versions before 147.0.7727.55, allowing a remote attacker to run arbitrary code inside the browser’s sandbox. The flaw stems from improper memory handling after a page navigation, which is a classic example of a use‑after‑free weakness (CWE‑416). If exploited, it could give an attacker the ability to execute code with the sandbox’s privileges, potentially bypassing restrictions on the local machine.
Affected Systems
This vulnerability affects the Chrome browser from Google, specifically all installations running any build prior to version 147.0.7727.55. The issue is independent of the underlying operating system, so it applies to Windows, macOS, and Linux environments where the affected Chrome version is installed.
Risk and Exploitability
The CVSS score of 8.8 indicates high severity. The EPSS score is below 1%, suggesting that known exploits are rare at the moment, and the vulnerability is not listed in the CISA KEV catalog. However, the attack vector is inferred to be a crafted HTML page that forces navigation, meaning that a social engineering approach could trigger the flaw. Given the high score and the potential for remote code execution within a sandbox, users should treat this flaw with high urgency.
OpenCVE Enrichment
Debian DSA