Impact
The vulnerability allows a remote attacker who has compromised the renderer process to escape its sandbox by submitting a specially crafted HTML page to Chrome’s Feedback feature. The flaw originates from insufficient validation of untrusted input, classified as CWE‑20. Exploiting this bug can grant the attacker privileges beyond the renderer, potentially enabling arbitrary code execution on the user’s machine.
Affected Systems
Google Chrome versions earlier than 147.0.7727.138 are impacted. Any installation of Chrome that has not yet been updated to at least this release is susceptible to the described sandbox escape and its associated consequences.
Risk and Exploitability
Chromium labels the vulnerability as high severity, but no EPSS score is available and it is not listed in the CISA KEV catalog. The attack requires a remote attacker to already have leveraged a compromise of the renderer process, after which a crafted HTML file triggers the validation flaw and facilitates a sandbox escape. While the immediate exploitation probability is unclear, the potential for privilege escalation and arbitrary code execution warrants prompt attention.
OpenCVE Enrichment