Description
Use after free in ServiceWorker in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Published: 2026-05-06
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A use‑after‑free vulnerability exists in the ServiceWorker implementation of Google Chrome before version 148.0.7778.96. The flaw allows a remote attacker to supply specially crafted HTML content that causes the ServiceWorker to reference freed memory, potentially leading to a sandbox escape. If the escape succeeds, the attacker could execute code outside the browser sandbox, enabling arbitrary code execution or local privilege escalation. The weakness corresponds to CWE‑416.

Affected Systems

Google Chrome desktop browsers that are running a version older than 148.0.7778.96 are susceptible. This includes all Windows, macOS, and Linux builds of the Chrome stable channel that have not yet applied the latest update.

Risk and Exploitability

Chromium has labeled the issue as high severity, reflected by a CVSS score of 8.3. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog, suggesting no confirmed widespread exploitation to date. However, the remote nature of the exploitation and the potential for sandbox escape indicate a high risk if a malicious site is loaded. The likely attack vector is a locally hosted or network‑served web page that leverages the ServiceWorker API to trigger the use‑after‑free. No exploit proof of concept or public exploit is currently documented.

Generated by OpenCVE AI on May 7, 2026 at 01:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Google Chrome version 148.0.7778.96 or later, which contains the ServiceWorker hardening fix.
  • Enable Chrome auto‑update or configure the update policy to ensure the latest security patches are applied consistently.
  • If upgrade is temporarily impossible, consider disabling ServiceWorkers via the "--disable-service-worker" flag or via Chrome flags, acknowledging that this may break legitimate web functionality.

Generated by OpenCVE AI on May 7, 2026 at 01:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6250-1 chromium security update
History

Thu, 07 May 2026 01:30:00 +0000

Type Values Removed Values Added
Title Use After Free in Chrome ServiceWorker Enables Potential Sandbox Escape

Wed, 06 May 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Wed, 06 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 May 2026 21:15:00 +0000

Type Values Removed Values Added
Title Use After Free in Chrome ServiceWorker Enables Potential Sandbox Escape

Wed, 06 May 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 06 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Use after free in ServiceWorker in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-07T03:56:50.435Z

Reserved: 2026-05-05T22:59:10.056Z

Link: CVE-2026-7922

cve-icon Vulnrichment

Updated: 2026-05-06T20:44:41.912Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-06T19:16:40.480

Modified: 2026-05-06T23:38:16.280

Link: CVE-2026-7922

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T01:15:17Z

Weaknesses