Impact
A use‑after‑free vulnerability exists in Chrome’s Payments component on Android for versions older than 147.0.7727.101. It allows a remote attacker who tricks a user into performing specific UI gestures to cause arbitrary code execution from a crafted HTML page. The weakness is identified as a memory safety flaw (CWE‑416) and a use of uninitialized data flaw (CWE‑825).
Affected Systems
Google Chrome for Android versions prior to 147.0.7727.101 are affected. Users of these older versions should be aware that any site that can load a malicious Payment‑related page could trigger the exploit.
Risk and Exploitability
The vulnerability carries a CVSS score of 7.5, indicating high severity, and is not yet listed in CISA’s KEV catalog. No EPSS score is available, but the requirement for user interaction and the need to host a crafted page reduces the likelihood of widespread exploitation. The remote attacker can execute code only on the victim’s device, providing full control over the affected Chrome instance.
OpenCVE Enrichment
Debian DSA