Description
Inappropriate implementation in Navigation in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)
Published: 2026-04-08
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information disclosure via cross‑origin data leak
Action: Patch Now
AI Analysis

Impact

A flaw in Chrome’s navigation handling lets a remote attacker who has already compromised a renderer process read data belonging to other origins through a specially crafted HTML page. The vulnerability results in information disclosure, exposing data that should remain confidential to the attacking party.

Affected Systems

The affectation is limited to Google Chrome version 147.0.7727.54 and earlier. All operating systems that run Chrome—Windows, macOS, and Linux—are susceptible because the flaw resides in the Chrome engine itself, not in the underlying OS. Users on any platform running the affected Chrome build are at risk until the browser is upgraded.

Risk and Exploitability

The CVSS score of 4.3 categorizes the weakness as low severity, and the EPSS probability is below 1 %. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires the attacker to already compromise the renderer process, which typically demands more advanced or privileged access, such as malware that can take control of the rendering context. Because of this prerequisite, the risk to a general user population remains modest, though organizations that rely on strict cross‑origin isolation should consider the threat more seriously.

Generated by OpenCVE AI on April 14, 2026 at 15:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to version 147.0.7727.55 or later
  • Verify that the browser displays the new version in the about page
  • Disable or restrict renderer processes if upgrade is not immediately possible
  • Maintain up‑to‑date sandbox policies and monitor for unexpected renderer activity

Generated by OpenCVE AI on April 14, 2026 at 15:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6205-1 chromium security update
History

Tue, 14 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Fri, 10 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title chromium-browser: Inappropriate implementation in Navigation
References
Metrics threat_severity

None

threat_severity

Low


Fri, 10 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Title Cross‑origin Data Leak via Navigation Implementation in Chrome
Weaknesses CWE-1037
CWE-200

Thu, 09 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-346
CWE-352
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
Title Cross‑origin Data Leak via Navigation Implementation in Chrome
First Time appeared Google
Google chrome
Weaknesses CWE-1037
CWE-200
Vendors & Products Google
Google chrome

Wed, 08 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Description Inappropriate implementation in Navigation in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-09T14:32:05.359Z

Reserved: 2026-04-08T20:10:22.013Z

Link: CVE-2026-5918

cve-icon Vulnrichment

Updated: 2026-04-09T14:30:38.320Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T22:16:31.570

Modified: 2026-04-14T14:09:06.027

Link: CVE-2026-5918

cve-icon Redhat

Severity : Low

Publid Date: 2026-04-07T00:00:00Z

Links: CVE-2026-5918 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:37:05Z

Weaknesses