Impact
An insufficient validation of untrusted cookie input within the browser allows a remote attacker to create a malicious HTML page that is treated as trustworthy by Chrome. The flaw enables privilege escalation within the Chrome process, potentially giving the attacker higher rights than the user’s normal sandbox permits. The vulnerability is rooted in CWE-20, highlighting improper input validation. The effect is a privilege escalation that can compromise data integrity and confidentiality on the affected host.
Affected Systems
All desktop editions of Google Chrome older than version 148.0.7778.96 are impacted. The flaw is present on the stable channel for Windows, macOS, and Linux, where cookie parsing has not yet received the mitigation. Versions 148.0.7778.96 and later contain the necessary input validation fixes.
Risk and Exploitability
The CVSS score is 8.8, indicating a high severity level. No EPSS score is available, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires a malicious webpage that the victim visits; therefore, the attack vector is Remote. While the vulnerability does not provide direct remote code execution, the privilege escalation potential makes it a significant risk if an attacker can persuade a user to load the crafted HTML.
OpenCVE Enrichment
Debian DSA