Description
Use after free in Aura in Google Chrome on Windows prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Published: 2026-05-06
Score: 8.3 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A use‑after‑free flaw in Aura of Google Chrome on Windows allows a remote attacker who has compromised a renderer process to escape the browser sandbox and potentially execute arbitrary code. The weakness is a use‑after‑free in memory management (CWE‑416), and because the renderer runs with limited privileges, a successful attack would give the attacker full system access.

Affected Systems

The vulnerability affects all Windows deployments of Google Chrome versions earlier than 148.0.7778.96. Users browsing malicious web pages with these outdated builds are exposed until the update is applied.

Risk and Exploitability

The EPSS score is not available and the issue is not yet listed in CISA KEV; the CVSS score of 8.3 indicates high severity. Attackers must deliver crafted HTML to a victim’s browser, which is a typical web‑based exploitation path. Once the renderer is involved, the use‑after‑free can trigger a sandbox escape, enabling full remote code execution on the host.

Generated by OpenCVE AI on May 7, 2026 at 01:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 148.0.7778.96 or later on all Windows machines.
  • If an immediate upgrade is not possible, employ policies or flags that restrict or disable third‑party renderer content, such as disabling relevant renderer features or blocking remote frames.
  • Use endpoint detection and response tools to monitor and block exploitation attempts targeting Chrome’s sandboxed processes.

Generated by OpenCVE AI on May 7, 2026 at 01:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 01:30:00 +0000

Type Values Removed Values Added
Title Use After Free in Aura Enabling Sandbox Escape via Crafted HTML

Wed, 06 May 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows

Wed, 06 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 May 2026 20:15:00 +0000

Type Values Removed Values Added
Title Use After Free in Aura Enabling Sandbox Escape via Crafted HTML
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 06 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Use after free in Aura in Google Chrome on Windows prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-07T03:56:41.114Z

Reserved: 2026-05-05T22:59:07.247Z

Link: CVE-2026-7911

cve-icon Vulnrichment

Updated: 2026-05-06T20:36:08.940Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-06T19:16:39.387

Modified: 2026-05-06T23:40:57.100

Link: CVE-2026-7911

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T01:15:17Z

Weaknesses