Description
Use after free in Chromoting in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code via malicious network traffic. (Chromium security severity: High)
Published: 2026-04-28
Score: 9.8 Critical
EPSS: n/a
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a use‑after‑free in the Chromoting component of Google Chrome. When the browser processes malicious network traffic, it may access memory that has already been freed, which can allow an attacker to execute arbitrary code. The CVE indicates a high severity but does not specify the privilege level of the code execution.

Affected Systems

Google Chrome versions older than 147.0.7727.138 are affected; any platform running these versions with the Chromoting feature enabled is potentially vulnerable.

Risk and Exploitability

The flaw carries a high severity rating. EPSS information is not currently available, and it is not listed in the CISA KEV catalog. Nevertheless, because arbitrary code execution can be achieved via network traffic, the potential for exploitation remains significant. The issue is classified as CWE‑416 and warrants prompt remediation.

Generated by OpenCVE AI on April 29, 2026 at 02:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to version 147.0.7727.138 or later, which contains the fix for the use‑after‑free in Chromoting.
  • Disable or restrict the Chromoting feature if it is not required for work or testing, thereby removing the attack surface exposed by the flaw.
  • Apply network segmentation or firewall rules that limit incoming traffic to the ports used by Chromoting to reduce the chance that malicious traffic reaches the vulnerable component.

Generated by OpenCVE AI on April 29, 2026 at 02:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title Chromoting Use-After‑Free Enables Remote Code Execution via Malicious Network Traffic chromium-browser: Use after free in Chromoting
Weaknesses CWE-825
References
Metrics threat_severity

None

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Important


Wed, 29 Apr 2026 03:00:00 +0000

Type Values Removed Values Added
Title Chromoting Use-After‑Free Enables Remote Code Execution via Malicious Network Traffic

Wed, 29 Apr 2026 00:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Tue, 28 Apr 2026 23:00:00 +0000

Type Values Removed Values Added
Description Use after free in Chromoting in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code via malicious network traffic. (Chromium security severity: High)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-28T22:36:05.500Z

Reserved: 2026-04-28T20:02:40.513Z

Link: CVE-2026-7347

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-28T23:16:22.280

Modified: 2026-04-28T23:16:22.280

Link: CVE-2026-7347

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-28T00:00:00Z

Links: CVE-2026-7347 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T02:45:35Z

Weaknesses