Description
Use after free in CSS in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Published: 2026-04-15
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A use‑after‑free bug in the CSS engine of Google Chrome before version 147.0.7727.101 lets a remote attacker trigger arbitrary code execution within the sandbox by serving a specially crafted HTML page. The weakness stems from improper handling of freed memory during style parsing, associated with CWE‑416. The flaw is also classified as CWE‑825, reflecting inadequate reinitialization of data structures after freeing, which contributed to the vulnerability. If exploited, it could allow an attacker to execute code inside the browser’s sandbox, potentially leading to further system compromise if sandbox escape techniques are employed.

Affected Systems

Google Chrome browsers running versions earlier than 147.0.7727.101 are affected. This includes all desktop installations of Chrome that have not been updated to the latest stable release. No other vendors or products are listed as impacted.

Risk and Exploitability

The vulnerability carries a high Chromium security severity, but no EPSS score is available, indicating uncertainty about current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the attack can be carried out by hosting a malicious web page that contains crafted CSS; an unsuspecting user rendering the page can trigger the use‑after‑free. The condition requires that the victim’s browser loads the malicious page, so the attack vector is likely a web‑page‑based, social‑engineering or drive‑by scenario.

Generated by OpenCVE AI on April 16, 2026 at 09:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 147.0.7727.101 or newer. This patch removes the use‑after‑free in the CSS engine.
  • Ensure Chrome auto‑updates are enabled so future fixes are applied automatically.
  • For enterprise users, consider applying group‑policy restrictions to block external stylesheets or enforce the "Disable remote content" setting to reduce the likelihood of malicious CSS being parsed.

Generated by OpenCVE AI on April 16, 2026 at 09:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6214-1 chromium security update
History

Fri, 17 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Thu, 16 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Title chromium-browser: Use after free in CSS
Weaknesses CWE-825
References
Metrics threat_severity

None

threat_severity

Important


Wed, 15 Apr 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 15 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Description Use after free in CSS in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-16T03:55:56.815Z

Reserved: 2026-04-14T18:12:20.884Z

Link: CVE-2026-6300

cve-icon Vulnrichment

Updated: 2026-04-15T19:49:50.547Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-15T20:16:38.987

Modified: 2026-04-17T15:41:19.433

Link: CVE-2026-6300

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-15T00:00:00Z

Links: CVE-2026-6300 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T09:15:30Z

Weaknesses