Description
Use after free in Cast in Google Chrome prior to 147.0.7727.138 allowed an attacker on the local network segment to execute arbitrary code inside a sandbox via malicious network traffic. (Chromium security severity: High)
Published: 2026-04-28
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: Local network code execution in the Chrome Cast component
Action: Immediate Patch
AI Analysis

Impact

A use‑after‑free vulnerability in the Cast component of Google Chrome allows an attacker on the same local network segment to send crafted network traffic that causes Chrome to execute arbitrary code inside its sandbox. This flaw can be exploited when the victim’s browser is running and receives malicious traffic, enabling the attacker to run code with the limited privileges of the Chrome sandbox.

Affected Systems

The affected product is Google Chrome. Versions prior to 147.0.7727.138 are vulnerable. The issue applies to the stable channel builds of Chrome before that release.

Risk and Exploitability

Exploitation requires a local network adversary capable of sending custom network packets to the target machine. The attacker does not need elevated or remote privileges; simply opening the vulnerable Chrome build to malicious traffic is sufficient. While the sandbox limits the impact to the browser’s process space, arbitrary code execution can still lead to credential theft, data exfiltration, or pivoting. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, but its high severity rating and local‑network attack surface suggest a potentially significant threat.

Generated by OpenCVE AI on April 29, 2026 at 01:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 147.0.7727.138 or later.
  • If a patch cannot be applied immediately, use a firewall or network segmentation to block unsolicited traffic from unknown local sources to the machine running Chrome.
  • Avoid opening local media streams or accessing local Cast devices unless they are trusted and verified.

Generated by OpenCVE AI on April 29, 2026 at 01:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title Local Network Use‑After‑Free in Chrome Cast Enables Arbitrary Code Execution chromium-browser: Use after free in Cast
Weaknesses CWE-825
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Important


Wed, 29 Apr 2026 01:30:00 +0000

Type Values Removed Values Added
Title Local Network Use‑After‑Free in Chrome Cast Enables Arbitrary Code Execution

Wed, 29 Apr 2026 00:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Tue, 28 Apr 2026 23:00:00 +0000

Type Values Removed Values Added
Description Use after free in Cast in Google Chrome prior to 147.0.7727.138 allowed an attacker on the local network segment to execute arbitrary code inside a sandbox via malicious network traffic. (Chromium security severity: High)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-28T22:36:00.774Z

Reserved: 2026-04-28T20:02:42.721Z

Link: CVE-2026-7349

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-28T23:16:22.490

Modified: 2026-04-28T23:16:22.490

Link: CVE-2026-7349

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-28T00:00:00Z

Links: CVE-2026-7349 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T01:15:44Z

Weaknesses