Impact
A use‑after‑free vulnerability in Chrome’s Proxy component allows an attacker who can serve a specially crafted HTML page to a user while the user has a privileged network position to potentially escape Chrome’s sandbox. If the attacker successfully triggers the vulnerable code, they can bypass process confinement and execute code with the user’s privileges or higher, leading to arbitrary code execution.
Affected Systems
All desktop installations of Google Chrome that are older than version 147.0.7727.101 are affected. The vulnerability exists on all supported operating systems for these versions.
Risk and Exploitability
The CVSS score of 8.3 denotes a high severity. Chromium assigns the issue a critical severity, emphasizing its potential impact. Although the vulnerability requires a knowledgeable attacker and a crafted HTML page, the likelihood of a successful sandbox escape in a controlled environment remains significant. No EPSS score is available, and the vulnerability is not listed in CISA’s KEV catalog, but the combination of a sandbox escape and a use‑after‑free flaw warrants immediate attention.
OpenCVE Enrichment