Description
Insufficient validation of untrusted input in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-04-08
Score: n/a
EPSS: n/a
KEV: No
Impact: Remote Code Execution
Action: Patch Now
AI Analysis

Impact

An insufficient validation of untrusted input in the Media component of Google Chrome 147.0.7727.55 and earlier allows a remote attacker, whose prior compromise has already taken control of a renderer process, to cause execution of arbitrary code inside the sandboxed renderer. The flaw is a classic input‑validation issue (CWE‑20) that fails to sanitize data coming from untrusted HTML, enabling the attacker to inject malicious payloads. Because the code runs with renderer‑level privileges, it can tamper with browser state, steal information, or pivot to more privileged layers if a sandbox escape is achieved.

Affected Systems

Google Chrome desktop installations – Windows, macOS, and Linux – using the stable channel version 147.0.7727.52 or earlier are affected. The advisory lists the vulnerable range up to 147.0.7727.55, which is released as a security update for all three operating systems. Any user who has not yet updated to this version is potentially exposed.

Risk and Exploitability

Chromium labels the vulnerability as Medium severity and it is not currently listed in the CISA KEV catalog, indicating no publicly documented widespread exploitation. EPSS data is not available, so the probability of a real‑world attack remains uncertain. However, the circumstances needed for exploitation – an attacker that has first compromised the renderer process and then navigates to a crafted page – represent a realistic attack vector for advanced persistent threats or malware campaigns that target browser weaknesses. The code runs within the sandbox, so the risk of full system compromise depends on a successful sandbox escape; without that, the threat is limited to browser‑level attacks.

Generated by OpenCVE AI on April 9, 2026 at 00:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 147.0.7727.55 or newer.
  • If an upgrade cannot be performed immediately, avoid loading or interacting with untrusted media content in the affected browser version.
  • Keep the browser updated regularly and monitor for further security releases from Google.

Generated by OpenCVE AI on April 9, 2026 at 00:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
Title Chrome Media Input Validation Flaw Allows Remote Code Execution in Renderer Sandbox
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 08 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Description Insufficient validation of untrusted input in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
Weaknesses CWE-20
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-08T21:20:50.785Z

Reserved: 2026-04-08T19:34:38.433Z

Link: CVE-2026-5884

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-08T22:16:28.050

Modified: 2026-04-08T22:16:28.050

Link: CVE-2026-5884

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:26:42Z

Weaknesses