Description
Use after free in Codecs in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Published: 2026-04-28
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A use‑after‑free bug exists in the media codec component of Google Chrome before version 147.0.7727.138. When a crafted HTML page is rendered, the bug causes a memory region that has already been freed to be accessed again, enabling an attacker to run code inside the browser’s sandboxed renderer process. The vulnerability allows the execution of arbitrary code, presenting a high‑severity risk for affected browsers.

Affected Systems

The flaw affects all Google Chrome installations on supported platforms—desktop, mobile, and web—where the version is older than 147.0.7727.138. Any stable channel build of Chrome that predates this release is vulnerable.

Risk and Exploitability

The issue is rated as high severity by Chromium security. An attacker who can supply a tailored web page can trigger the use‑after‑free from any remote location without the need for local credentials. No EPSS score is available, so the exploitation probability cannot be quantified, and the vulnerability is not listed in the CISA KEV catalog. The attacker can execute arbitrary sandboxed code, which could be used for further attacks from within the confined renderer process.

Generated by OpenCVE AI on April 29, 2026 at 02:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to version 147.0.7727.138 or newer received from the official update channel.
  • If an immediate update is not feasible, disable the affected media codec processing via browser flags or policy settings to prevent the exploitation of the vulnerability.
  • Ensure automatic updates are enabled so that future patches for this and related vulnerabilities are applied automatically.

Generated by OpenCVE AI on April 29, 2026 at 02:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title Use-After-Free in Chrome Codecs Enables Remote RCE chromium-browser: Use after free in Codecs
Weaknesses CWE-825
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

threat_severity

Important


Wed, 29 Apr 2026 03:00:00 +0000

Type Values Removed Values Added
Title Use-After-Free in Chrome Codecs Enables Remote RCE

Wed, 29 Apr 2026 00:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Tue, 28 Apr 2026 23:00:00 +0000

Type Values Removed Values Added
Description Use after free in Codecs in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-28T22:36:01.196Z

Reserved: 2026-04-28T20:02:41.233Z

Link: CVE-2026-7348

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-28T23:16:22.377

Modified: 2026-04-28T23:16:22.377

Link: CVE-2026-7348

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-28T00:00:00Z

Links: CVE-2026-7348 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T02:45:35Z

Weaknesses