Impact
Google Chrome versions prior to 147.0.7727.55 contained a flaw in the Downloads UI that permits a remote attacker to perform UI spoofing through a crafted web page. By persuading a user to carry out specific interface gestures, the attacker can manipulate the visual presentation of the download security information, potentially misleading the user about the provenance or safety of a downloaded item. The official description labels the issue with low severity.
Affected Systems
This vulnerability applies to all installations of Google Chrome running on operating systems supported by Chrome—including Windows, macOS, Linux, and other platforms—provided the browser version is earlier than 147.0.7727.55. The affected revisions are identified by the CPE strings for Google Chrome, Apple macOS, Linux kernel, and Microsoft Windows, indicating that any Chrome instance on these systems may be vulnerable if not updated.
Risk and Exploitability
The CVSS score of 4.3 indicates a low overall risk, and the EPSS score of less than 1% suggests a very low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an attacker to engage a user with a malicious web page that triggers the specific UI gestures; no additional privileges or pre‑conditions are necessary. The remote nature of the attack combined with the need for user interaction makes widespread exploitation unlikely, yet the presence of an official vulnerability record and the ability to deceive users still warrants remediation.
OpenCVE Enrichment
Debian DSA