Description
Insufficient validation of untrusted input in Persistent Cache in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-05-06
Score: 3.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability exists because Chrome does not sufficiently validate untrusted input stored in the Persistent Cache. When a renderer process has been compromised, an attacker can craft a malicious HTML page that bypasses the browser’s site isolation protection. Site isolation normally prevents code from one site from reading or influencing data from another site, so this flaw can lead to cross‑site data leakage or further escalation within the browser. The weakness is classified as CWE‑20, Input Validation.

Affected Systems

Users of Google Chrome on desktop whose installations are older than version 148.0.7778.96 are affected. The issue applies to all stable channel releases on Windows, macOS, and Linux until the next update. Versions equal to or newer than 148.0.7778.96 do not contain the flaw.

Risk and Exploitability

The Chromium team rated the vulnerability as Medium with a CVSS score of 3.1. No EPSS score is available, suggesting that exploitation is possible but not necessarily common. The flaw requires the attacker to have already compromised a renderer process, a prerequisite that limits immediate risk. Because site isolation is a core browser boundary, a successful exploit could expose sensitive data from other sites. The vulnerability is not listed in the CISA KEV catalog and currently there is no publicly available exploit.

Generated by OpenCVE AI on May 7, 2026 at 01:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 148.0.7778.96 or later via the official update channel.
  • Verify that Site Isolation is enabled by checking chrome://flags or by applying an enterprise policy that enforces site isolation.
  • Review and remove unnecessary or high‑privilege extensions and keep the system updated to reduce the chance of renderer compromise.

Generated by OpenCVE AI on May 7, 2026 at 01:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6250-1 chromium security update
History

Thu, 07 May 2026 01:30:00 +0000

Type Values Removed Values Added
Title Site Isolation Bypass via Persistent Cache Input Validation in Google Chrome

Wed, 06 May 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Wed, 06 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 06 May 2026 20:45:00 +0000

Type Values Removed Values Added
Title Site Isolation Bypass via Persistent Cache Input Validation in Google Chrome
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 06 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Insufficient validation of untrusted input in Persistent Cache in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. (Chromium security severity: Medium)
Weaknesses CWE-20
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-06T21:57:36.263Z

Reserved: 2026-05-05T22:59:16.330Z

Link: CVE-2026-7944

cve-icon Vulnrichment

Updated: 2026-05-06T21:41:14.752Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-06T19:16:42.730

Modified: 2026-05-06T23:32:48.223

Link: CVE-2026-7944

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T01:15:17Z

Weaknesses