Description
Insufficient validation of untrusted input. in Compositing in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. (Chromium security severity: High)
Published: 2026-04-28
Score: 8.7 High
EPSS: n/a
KEV: No
Impact: Site isolation bypass
Action: Patch Immediately
AI Analysis

Impact

The vulnerability arises from insufficient validation of untrusted input in the compositing component of Chrome. An attacker who has compromised a renderer process can supply a specially crafted HTML page that bypasses Chrome’s site isolation, allowing that process to access resources belonging to other sites. This effectively lifts the isolation boundary and can lead to data theft, credential compromise, or other attacks against users while Chrome is running. The flaw is classified as CWE‑20 and is rated high severity by Chromium.

Affected Systems

Affected versions are all releases of Google Chrome before 147.0.7727.138. The problem does not exist in later releases where the patch has been applied.

Risk and Exploitability

Because the exploit requires an attacker to first compromise the renderer process, the risk is lower than a purely remote exploit, and the EPSS score is unavailable. The CVSS score is not listed here, but the vulnerability is marked high severity and is not in CISA’s KEV catalog. In practice, the attack vector is a crafted HTML page delivered to a user who has already compromised a renderer, possibly via drive‑by or malicious add‑ons, making the threat more limited but still significant for affected Chrome users.

Generated by OpenCVE AI on April 29, 2026 at 01:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 147.0.7727.138 or later.
  • Verify that site isolation is enabled in Chrome settings or through policy to prevent accidental cross‑site attacks.
  • Avoid opening untrusted or suspicious HTML content from untrusted sources until a patch is applied.

Generated by OpenCVE AI on April 29, 2026 at 01:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title Chrome Site Isolation Bypass via Input Validation Flaw chromium-browser: Insufficient validation of untrusted input in Compositing
Weaknesses CWE-1173
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}

threat_severity

Important


Wed, 29 Apr 2026 01:30:00 +0000

Type Values Removed Values Added
Title Chrome Site Isolation Bypass via Input Validation Flaw

Wed, 29 Apr 2026 01:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Tue, 28 Apr 2026 23:00:00 +0000

Type Values Removed Values Added
Description Insufficient validation of untrusted input. in Compositing in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-20
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-28T22:35:55.821Z

Reserved: 2026-04-28T20:02:48.922Z

Link: CVE-2026-7360

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-28T23:16:23.570

Modified: 2026-04-28T23:16:23.570

Link: CVE-2026-7360

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-28T00:00:00Z

Links: CVE-2026-7360 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T01:15:44Z

Weaknesses