Impact
An incorrect behavior in the Downloads security user interface of Google Chrome prior to version 147.0.7727.55 lets a remote attacker craft a web page that, when a user interacts with specific UI gestures, causes the browser to display misleading UI elements. This UI spoofing can trick users into accepting malicious downloads or following unsafe links. No direct code execution or data loss occurs, but the social engineering required can lead to user compromise or accidental download of malware.
Affected Systems
The flaw affects all installations of the stable channel of Google Chrome that have not yet been updated to 147.0.7727.55 or later. This includes every platform supported by Chrome (Windows, macOS, Linux, Android, iOS) because the issue resides in the core download UI logic.
Risk and Exploitability
Chromium lists the issue as low severity. No public evidence of exploitation exists and the EPSS score is not available. An attacker would need to lure a user to a malicious web page and persuade the user to perform specific UI gestures, so the attack requires user interaction and social engineering. While the risk is moderate due to the low severity, the potential for phishing or malware delivery warrants prompt mitigation.
OpenCVE Enrichment