Description
Use after free in WebMIDI in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Published: 2026-04-28
Score: 9.0 Critical
EPSS: n/a
KEV: No
Impact: Remote code execution via sandbox escape
Action: Immediate patch
AI Analysis

Impact

This vulnerability is a use‑after‑free within Chrome's WebMIDI implementation. An attacker who can compromise the renderer process – for example, by serving malicious content on a web page – can trigger a memory corruption that leads to a sandbox escape. The flaw is classified as CWE‑416, and could allow the attacker to execute arbitrary code with a higher privilege level than the browser sandbox, potentially compromising a user’s entire system.

Affected Systems

Google Chrome versions prior to 147.0.7727.138 are affected. The vulnerability exists only in the desktop Chrome browser and is not present in earlier patched releases.

Risk and Exploitability

Chromium lists this incident with high severity, indicating a significant risk to both confidentiality and integrity. The EPSS score is not available, so the current exploitation probability is unknown, and the vulnerability is not included in CISA's KEV catalog. The attack vector requires a compromised renderer process, typically achieved through malicious HTML content or a crafted web page, which makes the exploit technically demanding but feasible for an attacker who can deliver code to the vulnerable browser.

Generated by OpenCVE AI on April 29, 2026 at 01:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to version 147.0.7727.138 or later
  • Disable the WebMIDI feature via chrome://flags or enterprise policy to block access to the vulnerable component
  • Monitor rendering processes for anomalous behavior and block suspicious domains that serve malicious content

Generated by OpenCVE AI on April 29, 2026 at 01:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title Use-After-Free in WebMIDI Enables Remote Sandbox Escape in Google Chrome chromium-browser: Use after free in WebMIDI
References
Metrics threat_severity

None

cvssV3_1

{'score': 9.0, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}

threat_severity

Important


Wed, 29 Apr 2026 01:30:00 +0000

Type Values Removed Values Added
Title Use-After-Free in WebMIDI Enables Remote Sandbox Escape in Google Chrome

Wed, 29 Apr 2026 00:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Tue, 28 Apr 2026 23:00:00 +0000

Type Values Removed Values Added
Description Use after free in WebMIDI in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-28T22:36:00.341Z

Reserved: 2026-04-28T20:02:43.369Z

Link: CVE-2026-7350

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-28T23:16:22.583

Modified: 2026-04-28T23:16:22.583

Link: CVE-2026-7350

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-28T00:00:00Z

Links: CVE-2026-7350 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T01:15:44Z

Weaknesses