Description
Use after free in SVG in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Published: 2026-05-06
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A use‑after‑free flaw was discovered in Chrome’s SVG handling stack that allows a remote attacker to execute arbitrary code within a sandboxed environment by loading a specially crafted HTML page. The flaw can be triggered from the network, leading to code execution and potentially credential theft or other malicious actions. The Chromium team rated the vulnerability as High severity, indicating a significant impact on confidentiality, integrity, and availability for affected users.

Affected Systems

The vulnerability affects all supported operating systems (Windows, macOS, Linux) running any Chromium‑based browser prior to version 148.0.7778.96. The flaw is present in the Stable channel and is fixed in Chrome 148.0.7778.96 and later releases. Users of older releases, including enterprise deployments, should update as soon as possible.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity vulnerability, consistent with Chromium’s rating. The EPSS score is not available, and the vulnerability has not been listed in CISA’s KEV catalog. The likely attack vector is a remote user visiting a malicious web page that delivers a crafted SVG file. Since the vulnerability is accessed through normal browser functionality, the attacker does not require privileged access or prior compromise. Once exploited, the attacker can execute code confined to Chrome’s sandbox, which still permits privilege escalation within the sandbox environment and possible lateral movement if additional browser features are leveraged.

Generated by OpenCVE AI on May 7, 2026 at 01:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 148.0.7778.96 or later to contain the fix.
  • Configure Chrome or your device management policies to enforce automatic updates and restrict manual version downgrades.
  • Where policy permits, disable or restrict the rendering of SVG content from untrusted origins through Chrome flags or site‑policy restrictions to reduce the attack surface.

Generated by OpenCVE AI on May 7, 2026 at 01:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6250-1 chromium security update
History

Thu, 07 May 2026 01:30:00 +0000

Type Values Removed Values Added
Title Use-after-free in Chrome SVG Rendering Allows Remote Code Execution

Wed, 06 May 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Wed, 06 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 May 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 06 May 2026 19:45:00 +0000

Type Values Removed Values Added
Title Use-after-free in Chrome SVG Rendering Allows Remote Code Execution

Wed, 06 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Use after free in SVG in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-07T03:56:34.364Z

Reserved: 2026-05-05T22:59:05.854Z

Link: CVE-2026-7906

cve-icon Vulnrichment

Updated: 2026-05-06T20:17:29.344Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-06T19:16:38.900

Modified: 2026-05-06T23:42:01.563

Link: CVE-2026-7906

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T01:15:17Z

Weaknesses