Description
Use after free in WebRTC in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Published: 2026-04-28
Score: n/a
EPSS: n/a
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A use‑after‑free bug exists in the WebRTC implementation of Google Chrome versions prior to 147.0.7727.138. When a crafted HTML page is loaded, the flaw causes the browser to access freed memory inside a sandboxed context, enabling a remote attacker to run arbitrary code with sandboxed privileges. The weakness is classified as CWE‑416 and the Chromium project rates the severity as high.

Affected Systems

Google Chrome browsers running any version earlier than 147.0.7727.138 are affected. This includes all stable channel releases that precede the security patch supplied in April 2026.

Risk and Exploitability

No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog, but the Chromium project has identified it as a high‑severity flaw. The likely attack vector is a malicious web page that a user visits or is prompted to open. Exploitation requires the victim to load the crafted page in a Chrome browser, after which arbitrary code can be executed inside the browser’s sandbox.

Generated by OpenCVE AI on April 29, 2026 at 01:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to version 147.0.7727.138 or later.
  • Enable Chrome’s Safe Browsing and Site Isolation features to reduce the impact while no patch is available.
  • Stay alert to additional Chrome security releases and apply them promptly.

Generated by OpenCVE AI on April 29, 2026 at 01:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 29 Apr 2026 01:30:00 +0000

Type Values Removed Values Added
Title Use After Free in Chrome WebRTC Enabling Remote Code Execution via Crafted HTML

Tue, 28 Apr 2026 23:00:00 +0000

Type Values Removed Values Added
Description Use after free in WebRTC in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-28T22:36:04.498Z

Reserved: 2026-04-28T20:02:33.914Z

Link: CVE-2026-7336

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-28T23:16:21.167

Modified: 2026-04-28T23:16:21.167

Link: CVE-2026-7336

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T02:00:26Z

Weaknesses