Description
Use after free in Media in Google Chrome on Android prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Published: 2026-04-28
Score: 9.0 Critical
EPSS: n/a
KEV: No
Impact: Remote Code Execution via Sandbox Escape
Action: Apply Patch
AI Analysis

Impact

A use‑after‑free flaw in Chrome’s media handling on Android allows a remote attacker who has already compromised the renderer process to escape the renderer sandbox by serving a specially crafted HTML page. The vulnerability could enable the attacker to execute arbitrary code outside the sandbox, compromising the device and potentially other applications. The weakness is a classic use‑after‑free error.

Affected Systems

Google Chrome on Android, versions earlier than 147.0.7727.138. The flaw appears only in Android deployments of Chrome; no other product or platform variants are listed as affected.

Risk and Exploitability

The CVE severity is rated High. No EPSS data is available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires that an attacker can inject a crafted HTML page into a renderer that has already been compromised. Because the attacker must control the renderer or supply malicious content, the likelihood of a full exploitation chain is limited to users who run untrusted web content or have a prior compromise of the rendering process. Despite the limited vector, the impact of escaping the sandbox is severe, warranting prompt remediation.

Generated by OpenCVE AI on April 29, 2026 at 02:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Chrome to version 147.0.7727.138 or later.
  • Apply any available Android OS security updates that include improvements to sandbox enforcement.
  • For managed devices, enforce Chrome update policies via enterprise management to ensure all installations are up‑to‑date.

Generated by OpenCVE AI on April 29, 2026 at 02:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title Use‑after‑Free in Chrome Android Media Allows Sandbox Escape chromium-browser: Use after free in Media
Weaknesses CWE-825
References
Metrics threat_severity

None

cvssV3_1

{'score': 9.0, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}

threat_severity

Important


Wed, 29 Apr 2026 02:30:00 +0000

Type Values Removed Values Added
Title Use‑after‑Free in Chrome Android Media Allows Sandbox Escape

Wed, 29 Apr 2026 00:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Tue, 28 Apr 2026 23:00:00 +0000

Type Values Removed Values Added
Description Use after free in Media in Google Chrome on Android prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-28T22:35:59.419Z

Reserved: 2026-04-28T20:02:44.224Z

Link: CVE-2026-7352

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-28T23:16:22.780

Modified: 2026-04-28T23:16:22.780

Link: CVE-2026-7352

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-28T00:00:00Z

Links: CVE-2026-7352 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T02:15:47Z

Weaknesses