Description
Heap buffer overflow in PDFium in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High)
Published: 2026-04-15
Score: 7.2 High
EPSS: n/a
KEV: No
Impact: Remote Code Execution via malicious PDF in Chrome sandbox
Action: Immediate Patch
AI Analysis

Impact

A heap buffer overflow in the PDFium rendering engine used by Google Chrome on Windows allows a remote attacker who persuades a user to interact with a specially crafted PDF file to execute arbitrary code within the browser's sandbox. The flaw requires specific user gestures but can be triggered by opening the PDF, resulting in code execution in a confined environment. The vulnerability is classified as high severity and is identified as CWE-122, representing improper heap management.

Affected Systems

Google Chrome for Windows is impacted. All installations of Chrome prior to version 147.0.7727.101 are vulnerable. The issue applies to any user running the older stable channel revision on a Windows system, regardless of additional hardware or software configuration.

Risk and Exploitability

The baseline CVSS score of 7.2 indicates a high level of severity, and no exploit probability metric is currently published. The vulnerability does not appear in CISA's Known Exploited Vulnerabilities catalog, suggesting no confirmed public exploitation attempts as of this analysis. Exploitation requires social engineering – the user must open the file and perform the required gestures – but once achieved, the attack can deliver arbitrary code with sandbox privileges. Maintenance of the risk is high until the Chrome patch is installed or mitigated through user education.

Generated by OpenCVE AI on April 16, 2026 at 02:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Chrome version 147.0.7727.101 or newer, which includes the PDFium patch
  • Ensure Chrome’s automatic update feature is enabled so future security fixes are applied promptly
  • Avoid opening PDF documents from untrusted sources and educate users about the risks associated with malicious files

Generated by OpenCVE AI on April 16, 2026 at 02:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 02:45:00 +0000

Type Values Removed Values Added
Title Heap Buffer Overflow in PDFium Enables Remote Code Execution via Malicious PDF on Windows Chrome

Wed, 15 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 15 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Description Heap buffer overflow in PDFium in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High)
Weaknesses CWE-122
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-16T03:56:15.725Z

Reserved: 2026-04-15T14:28:37.948Z

Link: CVE-2026-6361

cve-icon Vulnrichment

Updated: 2026-04-15T19:51:28.112Z

cve-icon NVD

Status : Received

Published: 2026-04-15T20:16:43.267

Modified: 2026-04-15T20:16:43.267

Link: CVE-2026-6361

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T02:30:21Z

Weaknesses