Description
Heap buffer overflow in WebRTC in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-04-28
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The WebRTC component in Google Chrome contains a heap buffer overflow that can be triggered by a maliciously crafted HTML page served from a remote host. If exploited, an attacker could corrupt the browser’s process memory and potentially execute arbitrary code, leading to compromise of the host system. This flaw is a classic example of unchecked user‑controlled data causing memory corruption, classified as CWE‑122 and CWE‑787.

Affected Systems

The vulnerability affects users running Google Chrome version 147.0.7727.137 or earlier on any platform where the browser is installed. Since the flaw resides in the WebRTC subsystem, it is active whenever the browser parses a page that includes WebRTC elements.

Risk and Exploitability

The CVSS base score of 8.8 indicates a high severity, while the EPSS score of less than 1% shows a low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Attackers would need to host a crafted HTML page and entice an end‑user to load it, typically via phishing or a malicious URL. In the absence of a publicly known exploit, the risk remains high until an official patch is applied.

Generated by OpenCVE AI on April 29, 2026 at 17:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 147.0.7727.138 or later
  • If an upgrade cannot be performed immediately, disable WebRTC functionality in Chrome through settings or an extension to block the vulnerable code path
  • Continuously monitor Google Chrome security advisories to stay informed of future patches or work‑arounds

Generated by OpenCVE AI on April 29, 2026 at 17:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 29 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title Heap Buffer Overflow in Chrome WebRTC via Crafted HTML Page chromium-browser: Heap buffer overflow in WebRTC
Weaknesses CWE-787
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Wed, 29 Apr 2026 01:30:00 +0000

Type Values Removed Values Added
Title Heap Buffer Overflow in Chrome WebRTC via Crafted HTML Page

Wed, 29 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Tue, 28 Apr 2026 23:00:00 +0000

Type Values Removed Values Added
Description Heap buffer overflow in WebRTC in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Weaknesses CWE-122
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-30T03:55:28.800Z

Reserved: 2026-04-28T20:02:35.329Z

Link: CVE-2026-7339

cve-icon Vulnrichment

Updated: 2026-04-29T13:08:57.887Z

cve-icon NVD

Status : Received

Published: 2026-04-28T23:16:21.483

Modified: 2026-04-29T14:16:21.087

Link: CVE-2026-7339

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-28T00:00:00Z

Links: CVE-2026-7339 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T17:15:16Z

Weaknesses