Description
Use after free in ANGLE in Google Chrome on Mac prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Published: 2026-05-06
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A use‑after‑free vulnerability was discovered in ANGLE, Chrome's graphics abstraction layer, which allows a remote attacker to execute arbitrary code within the browser's sandbox. The flaw is a classic use‑after‑free scenario (CWE‑416). Based on the description, it is inferred that the flaw can be triggered by a crafted HTML page served by a remote attacker. If successfully exploited, the attacker gains the ability to run code with the privileges of the running Chrome process, potentially compromising system integrity and confidentiality.

Affected Systems

Google Chrome on macOS versions prior to 148.0.7778.96 is affected. The issue is limited to the stable channel releases for desktop users who are running Chrome before the 148.0.7778.96 update.

Risk and Exploitability

The exploit requires a remote attacker to serve a malicious, specially crafted webpage that the victim visits. Based on the description, it is inferred that the attack vector is a remote attacker delivering a malicious webpage. Although the EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, the Chromium security team rated it as high severity with a CVSS score of 8.8, indicating a potentially serious impact if exploited. No publicly known exploit exists yet, but the remote code execution nature and the lack of mitigation in earlier versions make the risk substantial.

Generated by OpenCVE AI on May 7, 2026 at 00:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Chrome to version 148.0.7778.96 or later, where ANGLE use‑after‑free is fixed
  • If an immediate patch is not feasible, block or isolate Chrome from Internet access using enterprise network controls to prevent delivery of malicious content
  • Configure Chrome to disable ANGLE or enforce software‑only rendering by turning off GPU acceleration in settings or using enterprise policy

Generated by OpenCVE AI on May 7, 2026 at 00:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6250-1 chromium security update
History

Thu, 07 May 2026 01:00:00 +0000

Type Values Removed Values Added
Title Use‑After‑Free in ANGLE Allows Remote Code Execution in Chrome Sandbox via Crafted Web Page

Wed, 06 May 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos

Wed, 06 May 2026 23:30:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 06 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 May 2026 21:00:00 +0000

Type Values Removed Values Added
Title Use‑After‑Free in ANGLE Allows Remote Code Execution in Chrome Sandbox via Crafted Web Page

Wed, 06 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Use after free in ANGLE in Google Chrome on Mac prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-07T03:56:04.734Z

Reserved: 2026-05-05T22:59:04.532Z

Link: CVE-2026-7901

cve-icon Vulnrichment

Updated: 2026-05-06T20:24:14.820Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-06T19:16:38.403

Modified: 2026-05-06T23:42:42.183

Link: CVE-2026-7901

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T00:45:16Z

Weaknesses