Description
Use after free in Media in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-04-28
Score: n/a
EPSS: n/a
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a use‑after‑free in the Media component of Google Chrome that permits a remote attacker to execute arbitrary code inside the browser’s sandbox by presenting a crafted HTML page. The flaw arises when the browser deallocates memory and subsequently accesses it, allowing the attacker to inject malicious code that can run with the browser process’s privileges.

Affected Systems

Google Chrome desktop browsers before version 147.0.7727.138 are affected. This issue resides in the Media handling code that processes HTML content loaded into the browser.

Risk and Exploitability

The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, indicating no currently known public exploitation. The official Chromium severity rating is Medium. The flaw requires a maliciously crafted HTML page served to or opened by the victim. The likely attack vector is a malicious website or drive‑by download; it is inferred that the attacker would need to convince the user to load the page. No public exploits have been reported. Once exploited, the attacker can run arbitrary code inside the sandbox, and it is inferred that additional privilege escalation might be possible if the sandbox can be bypassed, although this is not explicitly documented.

Generated by OpenCVE AI on April 29, 2026 at 03:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Chrome to version 147.0.7727.138 or later to patch the use‑after‑free vulnerability (CWE‑416).
  • Enable automatic updates so that future security fixes are applied without manual intervention.
  • As a temporary safeguard, disable video or audio media features that are not essential—this reduces the code paths that could exploit the flaw and mitigates the risk associated with CWE‑416 until a patch is fully deployed.

Generated by OpenCVE AI on April 29, 2026 at 03:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 03:30:00 +0000

Type Values Removed Values Added
Title Use‑after‑free in Chrome Media Component Enables Remote Code Execution via Crafted HTML

Wed, 29 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Tue, 28 Apr 2026 23:00:00 +0000

Type Values Removed Values Added
Description Use after free in Media in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-28T22:36:09.280Z

Reserved: 2026-04-28T20:02:45.860Z

Link: CVE-2026-7355

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-28T23:16:23.060

Modified: 2026-04-28T23:16:23.060

Link: CVE-2026-7355

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T03:15:45Z

Weaknesses