Description
Use after free in Video in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
Published: 2026-04-15
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Out-of-Bounds Memory Access
Action: Upgrade Chrome
AI Analysis

Impact

This vulnerability is a use‑after‑free flaw in the Video component of Google Chrome on Windows. When a renderer process has already been compromised by a remote attacker, a specially crafted HTML page can cause Chrome to perform memory accesses outside the intended bounds. The out‑of‑bounds access leads to memory corruption, which can compromise the stability of the renderer and potentially enable further exploitation. The weakness is categorized as CWE‑416 and CWE‑825.

Affected Systems

Google Chrome browser installations on Windows that are running a version prior to 147.0.7727.101, which contain the vulnerable Video component used during web page rendering.

Risk and Exploitability

The flaw has a CVSS score of 8.8, denoting high severity. An EPSS score has not been published, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires that the attacker already controls the renderer process; thus, it is not a first‑stage remote exploit. Although the attack conditions are restrictive and no public exploit has been documented, the potential for memory corruption and the high CVSS warrant remediation and vigilant monitoring.

Generated by OpenCVE AI on April 17, 2026 at 06:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 147.0.7727.101 or newer on all Windows machines.
  • Enable automatic updates for Google Chrome so that new security releases are applied automatically.
  • Monitor renderer processes for unusual activity or out‑of‑bounds memory accesses as a potential sign of exploitation.

Generated by OpenCVE AI on April 17, 2026 at 06:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6214-1 chromium security update
History

Fri, 17 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Thu, 16 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Title Use After Free in Video Component May Allow Out-of-Bounds Memory Access in Google Chrome on Windows chromium-browser: Use after free in Video
Weaknesses CWE-825
References
Metrics threat_severity

None

threat_severity

Important


Wed, 15 Apr 2026 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 15 Apr 2026 22:30:00 +0000

Type Values Removed Values Added
Title Use After Free in Video Component May Allow Out-of-Bounds Memory Access in Google Chrome on Windows

Wed, 15 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Description Use after free in Video in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-16T03:55:55.574Z

Reserved: 2026-04-15T14:28:37.442Z

Link: CVE-2026-6359

cve-icon Vulnrichment

Updated: 2026-04-15T19:48:20.797Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-15T20:16:42.597

Modified: 2026-04-17T19:21:14.907

Link: CVE-2026-6359

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-15T00:00:00Z

Links: CVE-2026-6359 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T07:00:08Z

Weaknesses