Description
Use after free in GPU in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Published: 2026-04-28
Score: 9.6 Critical
EPSS: n/a
KEV: No
Impact: Remote sandbox escape via crafted web page
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a use‑after‑free bug in Chrome’s GPU image‑buffer handling that can be triggered by a malicious HTML page. When the renderer processes such a page, a reference to a freed buffer can be reused, potentially breaking out of the renderer sandbox and giving an attacker code execution privileges.

Affected Systems

Google Chrome for desktop is affected. All stable releases prior to version 147.0.7727.138 contain the vulnerability in the GPU component of the renderer process.

Risk and Exploitability

Chromium labels the issue as High severity; the EPSS score is not publicly available and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a malicious webpage that causes the browser to re‑use GPU memory, so an attacker who can host or inject content into a user’s browsing session could exploit the bug. Successful exploitation could lead to a sandbox escape and full system compromise. The risk is significant because the attack requires only a crafted page, making it potentially wide‑scale if distributed via compromised sites or phishing emails.

Generated by OpenCVE AI on April 29, 2026 at 01:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to version 147.0.7727.138 or later; the update removes the GPU use‑after‑free flaw.
  • If an update cannot be applied immediately, temporarily disable hardware acceleration by opening chrome://settings/system and turning off the ‘Use hardware acceleration when available’ option; this eliminates the vulnerable GPU code path.
  • Continue to monitor Chrome security advisories and install any subsequent patches promptly to maintain protection against related or new exploits.

Generated by OpenCVE AI on April 29, 2026 at 01:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title Use After Free in GPU Enables Remote Sandbox Escape in Google Chrome chromium-browser: Use after free in GPU
Weaknesses CWE-825
References
Metrics threat_severity

None

cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}

threat_severity

Important


Wed, 29 Apr 2026 01:30:00 +0000

Type Values Removed Values Added
Title Use After Free in GPU Enables Remote Sandbox Escape in Google Chrome

Wed, 29 Apr 2026 00:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Tue, 28 Apr 2026 23:00:00 +0000

Type Values Removed Values Added
Description Use after free in GPU in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-28T22:35:55.267Z

Reserved: 2026-04-28T20:02:32.296Z

Link: CVE-2026-7333

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-28T23:16:20.843

Modified: 2026-04-28T23:16:20.843

Link: CVE-2026-7333

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-28T00:00:00Z

Links: CVE-2026-7333 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T01:15:44Z

Weaknesses