Impact
The vulnerability comes from an incorrect security UI in the permissions handling of Google Chrome on Windows, allowing an attacker to craft a malicious HTML page that deceives users into believing they are viewing a legitimate domain. This flaw enables remote domain spoofing and corresponds to the CWE-613 class of information exposure through UI.
Affected Systems
Only Windows installations of Google Chrome prior to version 147.0.7727.55 are affected. Updating to the patched version corrects the UI logic and prevents spoofing.
Risk and Exploitability
Chromium rates the issue as low severity and no EPSS score is available, so the real‑world exploitation likelihood is uncertain. However, a remote attacker could deliver the crafted HTML to a user without additional privileges, enabling domain spoofing. The vulnerability is not listed in the CISA KEV catalog, suggesting no known public exploits at this time.
OpenCVE Enrichment