Description
Use after free in Navigation in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-04-08
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A use‑after‑free error occurs during navigation in Google Chrome versions before 147.0.7727.55, allowing a remote attacker to run arbitrary code inside the browser’s sandbox. The flaw stems from improper memory handling after a page navigation, which is a classic example of a use‑after‑free weakness (CWE‑416). If exploited, it could give an attacker the ability to execute code with the sandbox’s privileges, potentially bypassing restrictions on the local machine.

Affected Systems

This vulnerability affects the Chrome browser from Google, specifically all installations running any build prior to version 147.0.7727.55. The issue is independent of the underlying operating system, so it applies to Windows, macOS, and Linux environments where the affected Chrome version is installed.

Risk and Exploitability

The CVSS score of 8.8 indicates high severity. The EPSS score is below 1%, suggesting that known exploits are rare at the moment, and the vulnerability is not listed in the CISA KEV catalog. However, the attack vector is inferred to be a crafted HTML page that forces navigation, meaning that a social engineering approach could trigger the flaw. Given the high score and the potential for remote code execution within a sandbox, users should treat this flaw with high urgency.

Generated by OpenCVE AI on April 14, 2026 at 21:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Chrome to version 147.0.7727.55 or later

Generated by OpenCVE AI on April 14, 2026 at 21:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6205-1 chromium security update
History

Tue, 14 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Mon, 13 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Fri, 10 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title Use-After-Free in Chrome Navigation Enables Remote Code Execution chromium-browser: Use after free in Navigation
Weaknesses CWE-825
References
Metrics threat_severity

None

cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}

threat_severity

Moderate


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
Title Use-After-Free in Chrome Navigation Enables Remote Code Execution
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 08 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Description Use after free in Navigation in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-13T18:19:32.569Z

Reserved: 2026-04-08T19:34:36.847Z

Link: CVE-2026-5877

cve-icon Vulnrichment

Updated: 2026-04-13T17:53:18.478Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T22:16:27.323

Modified: 2026-04-14T20:02:13.440

Link: CVE-2026-5877

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-07T00:00:00Z

Links: CVE-2026-5877 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:15:11Z

Weaknesses