Impact
A use‑after‑free vulnerability exists in the ServiceWorker implementation of Google Chrome before version 148.0.7778.96. The flaw allows a remote attacker to supply specially crafted HTML content that causes the ServiceWorker to reference freed memory, potentially leading to a sandbox escape. If the escape succeeds, the attacker could execute code outside the browser sandbox, enabling arbitrary code execution or local privilege escalation. The weakness corresponds to CWE‑416.
Affected Systems
Google Chrome desktop browsers that are running a version older than 148.0.7778.96 are susceptible. This includes all Windows, macOS, and Linux builds of the Chrome stable channel that have not yet applied the latest update.
Risk and Exploitability
Chromium has labeled the issue as high severity, reflected by a CVSS score of 8.3. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog, suggesting no confirmed widespread exploitation to date. However, the remote nature of the exploitation and the potential for sandbox escape indicate a high risk if a malicious site is loaded. The likely attack vector is a locally hosted or network‑served web page that leverages the ServiceWorker API to trigger the use‑after‑free. No exploit proof of concept or public exploit is currently documented.
OpenCVE Enrichment
Debian DSA