Description
Insufficient validation of untrusted input in Feedback in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Published: 2026-04-28
Score: 8.0 High
EPSS: n/a
KEV: No
Impact: Remote Code Execution
Action: Update Chrome
AI Analysis

Impact

The vulnerability allows a remote attacker who has compromised the renderer process to escape its sandbox by submitting a specially crafted HTML page to Chrome’s Feedback feature. The flaw originates from insufficient validation of untrusted input, classified as CWE‑20. Exploiting this bug can grant the attacker privileges beyond the renderer, potentially enabling arbitrary code execution on the user’s machine.

Affected Systems

Google Chrome versions earlier than 147.0.7727.138 are impacted. Any installation of Chrome that has not yet been updated to at least this release is susceptible to the described sandbox escape and its associated consequences.

Risk and Exploitability

Chromium labels the vulnerability as high severity, but no EPSS score is available and it is not listed in the CISA KEV catalog. The attack requires a remote attacker to already have leveraged a compromise of the renderer process, after which a crafted HTML file triggers the validation flaw and facilitates a sandbox escape. While the immediate exploitation probability is unclear, the potential for privilege escalation and arbitrary code execution warrants prompt attention.

Generated by OpenCVE AI on April 29, 2026 at 02:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Chrome update (147.0.7727.138 or newer).
  • In the interim, block the Feedback form by disabling the native Feedback menu item via the Chrome policy 'DisableChromeFeedback'.
  • Run regular security scans and keep the operating system fully patched to prevent renderer process compromise, which is a prerequisite for this exploit.

Generated by OpenCVE AI on April 29, 2026 at 02:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title Chrome Feedback Feature Enables Rendering Process Sandbox Escape chromium-browser: Insufficient validation of untrusted input in Feedback
Weaknesses CWE-1286
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.0, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H'}

threat_severity

Important


Wed, 29 Apr 2026 02:30:00 +0000

Type Values Removed Values Added
Title Chrome Feedback Feature Enables Rendering Process Sandbox Escape

Wed, 29 Apr 2026 00:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Tue, 28 Apr 2026 23:00:00 +0000

Type Values Removed Values Added
Description Insufficient validation of untrusted input in Feedback in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-20
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-28T22:36:06.468Z

Reserved: 2026-04-28T20:02:39.619Z

Link: CVE-2026-7345

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-28T23:16:22.083

Modified: 2026-04-28T23:16:22.083

Link: CVE-2026-7345

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-28T00:00:00Z

Links: CVE-2026-7345 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T02:15:47Z

Weaknesses