Description
Use after free in Graphite in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Published: 2026-04-15
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Sandbox escape (potential remote code execution)
Action: Immediate Patch
AI Analysis

Impact

A use‑after‑free bug in Chrome’s Graphite rendering engine allows a remote attacker who has already compromised the renderer process to trigger a sandbox escape by loading a specially crafted HTML page. This flaw, represented by CWE‑416 and CWE‑825, carries a high severity rating and could permit execution of arbitrary code outside Chrome’s sandbox.

Affected Systems

All users operating Google Chrome on desktop via the stable channel with a build older than 147.0.7727.101 are affected. Versions released after that revision are not impacted, and other Chrome channels are not mentioned as vulnerable.

Risk and Exploitability

The CVSS score of 8.3 indicates significant impact, yet the exploit path requires prior compromises of the renderer process and currently no public exploits are known. The EPSS score is 0.022%, indicating a very low probability of exploitation, and the vulnerability is not listed in CISA’s KEV catalog, leaving practical risk moderate but the potential damage from a sandbox escape substantial. Timely patching remains recommended due to the high severity rating.

Generated by OpenCVE AI on April 17, 2026 at 08:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 147.0.7727.101 or later immediately.
  • Enable automatic updates so the fix is applied as soon as it is released.
  • Activate Chrome’s Safe Browsing feature and enforce content‑security policies to reduce the likelihood of renderer compromise by blocking malicious content.

Generated by OpenCVE AI on April 17, 2026 at 08:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6214-1 chromium security update
History

Fri, 17 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Thu, 16 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title Use‑after‑free in Chrome’s Graphite Engine Enables Sandbox Escape google-chrome: chromium: Google Chrome and Chromium: Sandbox escape via use-after-free vulnerability in Graphite.
Weaknesses CWE-825
References
Metrics threat_severity

None

threat_severity

Important


Thu, 16 Apr 2026 09:30:00 +0000

Type Values Removed Values Added
Title Use‑after‑free in Chrome’s Graphite Engine Enables Sandbox Escape

Wed, 15 Apr 2026 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 15 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Description Use after free in Graphite in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-16T03:56:03.915Z

Reserved: 2026-04-14T18:12:22.316Z

Link: CVE-2026-6304

cve-icon Vulnrichment

Updated: 2026-04-15T19:55:17.533Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-15T20:16:39.593

Modified: 2026-04-17T17:27:26.823

Link: CVE-2026-6304

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-15T19:04:50Z

Links: CVE-2026-6304 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T08:30:13Z

Weaknesses