Description
Insufficient validation of untrusted input in WebSockets in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page. (Chromium security severity: Low)
Published: 2026-04-08
Score: n/a
EPSS: n/a
KEV: No
Impact: Same-origin policy bypass via WebSocket input validation flaw
Action: Patch Chrome
AI Analysis

Impact

An insufficient validation of untrusted input in WebSockets allows a remote attacker who has already compromised a Chrome renderer process to bypass the same‑origin policy using a crafted HTML page. The attacker can therefore access or manipulate resources that belong to other origins, which may lead to unauthorized data disclosure or modification. The vulnerability is identified as a low‑severity issue in Chromium, suggesting that the exploitation complexity is moderate but the potential impact on confidentiality exists.

Affected Systems

Google Chrome versions prior to 147.0.7727.55 are affected. The issue does not apply to later releases that include the patched WebSocket input validation logic.

Risk and Exploitability

Exactly how often this vulnerability is exploited is unknown because no EPSS score is available and the vulnerability is not listed in CISA’s KEV catalog. The CVSS assessment marks it as low severity, indicating that the overall risk is modest. Exploitation requires a two‑stage attack: first a compromise of the renderer process, then delivery of a crafted web page that triggers the WebSocket validation flaw. Because both prerequisites are non‑trivial, the likelihood of a widespread attack is considered low, but organisations with critical applications in Chrome should treat it with caution.

Generated by OpenCVE AI on April 8, 2026 at 22:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to version 147.0.7727.55 or later.
  • Ensure that automatic updates are enabled so that future security fixes are applied promptly.

Generated by OpenCVE AI on April 8, 2026 at 22:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
Title Remote WebSocket Origin Policy Bypass via Renderer Compromise in Chrome
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 08 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Description Insufficient validation of untrusted input in WebSockets in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page. (Chromium security severity: Low)
Weaknesses CWE-20
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-08T21:21:07.618Z

Reserved: 2026-04-08T20:10:22.501Z

Link: CVE-2026-5919

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-08T22:16:31.667

Modified: 2026-04-08T22:16:31.667

Link: CVE-2026-5919

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:26:01Z

Weaknesses