Description
Use after free in Canvas in Google Chrome on Linux, ChromeOS prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)
Published: 2026-04-28
Score: 9.6 Critical
EPSS: n/a
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A use‑after‑free flaw exists in the Canvas implementation of Google Chrome on Linux and ChromeOS versions prior to 147.0.7727.138. The vulnerability permits a remote attacker to craft a malicious HTML page that, when opened by a victim, causes the browser to execute arbitrary code inside its sandboxed rendering process. The flaw is classified by Chromium as Critical and is identified as CWE-416. The attacker can potentially redirect execution flow to injected code, thereby compromising the sandboxed context of the browser.

Affected Systems

Google Chrome on Linux and ChromeOS systems using versions earlier than 147.0.7727.138 are affected. The Canvas feature in these versions contains the vulnerable memory handling bug. No other products are listed as affected.

Risk and Exploitability

The EPSS score is not available, and the vulnerability has not been listed in CISA's KEV catalog. However, the Critical severity designation from Chromium indicates a high likelihood of exploitation in the wild. The attack vector is remote, relying on a crafted HTML page that a user can be induced to open, such as via a malicious website or phishing email. Once triggered, the flaw allows execution of arbitrary code within the browser's sandbox, providing a foothold for further attacks.

Generated by OpenCVE AI on April 29, 2026 at 01:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to version 147.0.7727.138 or later as published by Google.
  • Restart all Chrome processes to ensure the new binary is loaded and the vulnerability is mitigated.
  • As a temporary measure, launch Chrome with the flag --disable-gpu or use a policy to disable canvas rendering until the patch is applied.

Generated by OpenCVE AI on April 29, 2026 at 01:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title Canvas Use‑After‑Free Enables Code Execution on Linux & ChromeOS chromium-browser: Use after free in Canvas
Weaknesses CWE-825
References
Metrics threat_severity

None

cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}

threat_severity

Important


Wed, 29 Apr 2026 01:30:00 +0000

Type Values Removed Values Added
Title Canvas Use‑After‑Free Enables Code Execution on Linux & ChromeOS

Wed, 29 Apr 2026 01:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Tue, 28 Apr 2026 23:00:00 +0000

Type Values Removed Values Added
Description Use after free in Canvas in Google Chrome on Linux, ChromeOS prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-04-28T22:35:53.191Z

Reserved: 2026-04-28T20:22:29.721Z

Link: CVE-2026-7363

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-28T23:16:23.773

Modified: 2026-04-28T23:16:23.773

Link: CVE-2026-7363

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-28T00:00:00Z

Links: CVE-2026-7363 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T01:15:44Z

Weaknesses