Description
Use after free in Forms in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Published: 2026-04-15
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a use‑after‑free flaw in the Forms component of Google Chrome that allows a crafted HTML page to trigger execution of arbitrary code within the browser’s sandbox. The flaw stems from improper deallocation of form objects, and an attacker can leverage it by presenting a malicious webpage. The impact is the ability to run code with the privileges of the browser process, potentially leading to privilege escalation or data theft. This weakness is classified as CWE‑416.

Affected Systems

Google Chrome versions older than 147.0.7727.101 are affected. Any installation of Chrome that has not applied the 147.0.7727.101 update or later is vulnerable. The issue applies to all platforms where Chrome runs, impacting end‑user machines, corporate desktops, and potentially embedded environments that ship the default Chrome bundle.

Risk and Exploitability

The vulnerability has a CVSS score of 8.8, indicating high severity. EPSS data is not available, and the issue is not listed in the CISA KEV catalog, but the lack of a publicly available exploit does not diminish the threat. The attack vector is inferred to be a crafted HTML page that a user needs to view, implying a reliance on user interaction; however, once loaded, the attacker can execute code within the browser’s sandbox. The combination of a high‑severity flaw and the need for user action suggests a moderate to high exploitation likelihood in environments where users regularly visit untrusted sites or download HTML files. The risk escalates if system administrators do not promptly resolve the vulnerability.

Generated by OpenCVE AI on April 15, 2026 at 21:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Chrome 147.0.7727.101 or later, which includes a fixed memory‑management patch for the Forms module.
  • If an immediate update is not possible, configure your environment to block or tightly sandbox external HTML content, such as using a web‑proxy filter or disabling unsupported file‑protocol access for Chrome.
  • Plan for regular update checks on Chrome releases and subscribe to Google’s release notes to apply forthcoming security patches without delay.

Generated by OpenCVE AI on April 15, 2026 at 21:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title Use‑After‑Free in Chrome Forms Enables Remote Code Execution Google Chrome: Chromium: Google Chrome/Chromium: Arbitrary code execution via use-after-free in Forms
Weaknesses CWE-825
References
Metrics threat_severity

None

threat_severity

Critical


Wed, 15 Apr 2026 22:15:00 +0000

Type Values Removed Values Added
Title Use‑After‑Free in Chrome Forms Enables Remote Code Execution

Wed, 15 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 15 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Description Use after free in Forms in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-16T03:55:49.002Z

Reserved: 2026-04-14T18:12:27.345Z

Link: CVE-2026-6316

cve-icon Vulnrichment

Updated: 2026-04-15T19:41:28.477Z

cve-icon NVD

Status : Received

Published: 2026-04-15T20:16:41.580

Modified: 2026-04-15T20:16:41.580

Link: CVE-2026-6316

cve-icon Redhat

Severity : Critical

Publid Date: 2026-04-15T19:04:56Z

Links: CVE-2026-6316 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T22:00:06Z

Weaknesses