Description
Use after free in Views in Google Chrome on Windows prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
Published: 2026-04-28
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A use‑after‑free flaw in the Views component of Google Chrome on Windows allows a remote attacker who has already compromised the renderer process to escape the browser sandbox and execute code beyond the intended isolation boundary. This vulnerability is a typical use‑after‑free error, and its exploitation can lead to arbitrary code execution with the privileges of the user running the browser.

Affected Systems

Google Chrome for Windows versions earlier than 147.0.7727.138 are affected. The issue specifically impacts the renderer process in those Chrome builds.

Risk and Exploitability

The recorded CVSS score is 9.8, signifying critical severity. The vulnerability is classified as Critical by Chromium. The attack requires that the attacker already have code execution in the renderer process on Windows. Once the use‑after‑free condition is triggered, the browser’s sandbox can be bypassed, allowing execution of code outside the renderer process. The EPSS score is 0.035%, indicating a very low but non‑zero probability of exploitation. The vulnerability is not listed in the CISA KEV catalog, indicating that there are no publicly reported exploits for it at the time of this analysis.

Generated by OpenCVE AI on April 29, 2026 at 21:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Chrome update to version 147.0.7727.138 or later to remove the use‑after‑free vulnerability.
  • Ensure the browser’s sandbox is enabled at launch (the default behavior) and that no command‑line flags disable it.
  • Use network or content policies to block the delivery of malicious or crafted HTML pages that could trigger renderer compo­risation.

Generated by OpenCVE AI on April 29, 2026 at 21:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 13:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.0, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 29 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title Use After Free in Chrome Windows Renderer Enables Sandbox Escape chromium-browser: Use after free in Views
Weaknesses CWE-825
References
Metrics threat_severity

None

cvssV3_1

{'score': 9.0, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}

threat_severity

Important


Wed, 29 Apr 2026 02:30:00 +0000

Type Values Removed Values Added
Title Use After Free in Chrome Windows Renderer Enables Sandbox Escape

Wed, 29 Apr 2026 01:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Tue, 28 Apr 2026 23:00:00 +0000

Type Values Removed Values Added
Description Use after free in Views in Google Chrome on Windows prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-29T12:53:02.939Z

Reserved: 2026-04-28T20:02:38.462Z

Link: CVE-2026-7343

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-28T23:16:21.883

Modified: 2026-04-29T13:16:53.763

Link: CVE-2026-7343

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-28T00:00:00Z

Links: CVE-2026-7343 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T21:45:20Z

Weaknesses