Description
Use after free in Proxy in Google Chrome prior to 147.0.7727.101 allowed an attacker in a privileged network position to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
Published: 2026-04-15
Score: 8.3 High
EPSS: n/a
KEV: No
Impact: Sandbox Escape / Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

A use‑after‑free vulnerability in Chrome’s Proxy component allows an attacker who can serve a specially crafted HTML page to a user while the user has a privileged network position to potentially escape Chrome’s sandbox. If the attacker successfully triggers the vulnerable code, they can bypass process confinement and execute code with the user’s privileges or higher, leading to arbitrary code execution.

Affected Systems

All desktop installations of Google Chrome that are older than version 147.0.7727.101 are affected. The vulnerability exists on all supported operating systems for these versions.

Risk and Exploitability

The CVSS score of 8.3 denotes a high severity. Chromium assigns the issue a critical severity, emphasizing its potential impact. Although the vulnerability requires a knowledgeable attacker and a crafted HTML page, the likelihood of a successful sandbox escape in a controlled environment remains significant. No EPSS score is available, and the vulnerability is not listed in CISA’s KEV catalog, but the combination of a sandbox escape and a use‑after‑free flaw warrants immediate attention.

Generated by OpenCVE AI on April 16, 2026 at 02:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Chrome to version 147.0.7727.101 or later. This release removes the use‑after‑free flaw discovered in the Proxy component.
  • Verify that Chrome’s sandbox remains enabled and that default security settings are intact; disable any experimental or reduced‑privilege modes that might weaken isolation.
  • If an immediate update is not feasible, restrict users from accessing untrusted or malicious web content from the network and monitor for unexpected browser behavior or unauthorized system interactions.

Generated by OpenCVE AI on April 16, 2026 at 02:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Title chromium-browser: Use after free in Proxy
Weaknesses CWE-825
References
Metrics threat_severity

None

threat_severity

Important


Wed, 15 Apr 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 15 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Description Use after free in Proxy in Google Chrome prior to 147.0.7727.101 allowed an attacker in a privileged network position to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-16T03:55:52.024Z

Reserved: 2026-04-14T18:12:19.764Z

Link: CVE-2026-6297

cve-icon Vulnrichment

Updated: 2026-04-15T19:43:36.639Z

cve-icon NVD

Status : Received

Published: 2026-04-15T20:16:38.470

Modified: 2026-04-15T20:16:38.470

Link: CVE-2026-6297

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-15T00:00:00Z

Links: CVE-2026-6297 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T02:30:21Z

Weaknesses