Description
Insufficient policy enforcement in WebUI in Google Chrome on Linux, Mac, Windows, ChromeOS prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-05-06
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in Google Chrome’s WebUI on Linux, macOS, Windows, and ChromeOS allowed a remote attacker who had already compromised the renderer process to bypass the browser’s site isolation boundary. By navigating to a specially crafted HTML page, the attacker could evict the isolation protection that normally keeps separate site processes from accessing each other’s data, thereby elevating privileges and potentially accessing sensitive data from another site or compromising the browser process. The vulnerability is identified as a medium severity issue in Chromium’s own ranking and represents an improper authorization weakness.

Affected Systems

Affected versions are all releases of Google Chrome prior to 148.0.7778.96 on Linux, macOS, Windows and ChromeOS. Any workstation or device using a pre―148.0.7778.96 build is potentially vulnerable.

Risk and Exploitability

The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, indicating no public exploitation evidence. The CVSS base score of 4.3 indicates low―to―moderate risk, which aligns with Chromium’s medium severity classification. The likely attack vector is a compromised renderer process, which could arise from a broader compromise or a prior vulnerability that grants code execution in the renderer context.

Generated by OpenCVE AI on May 7, 2026 at 03:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 148.0.7778.96 or later to remove the bypass
  • Enable site isolation by configuring the Chrome enterprise policy "SiteIsolationEnabled" to true or leaving the default flag enabled
  • Restrict Chrome process permissions by running it under a dedicated sandboxed user account to minimize damage if a renderer process is compromised

Generated by OpenCVE AI on May 7, 2026 at 03:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6250-1 chromium security update
History

Thu, 07 May 2026 03:45:00 +0000

Type Values Removed Values Added
Title Chrome WebUI Policy Enforcement Allows Renderer-Based Site Isolation Bypass
Weaknesses CWE-285

Thu, 07 May 2026 01:30:00 +0000

Type Values Removed Values Added
Title Insufficient Policy Enforcement in Chrome WebUI Allows Remote Site Isolation Bypass
Weaknesses CWE-285

Wed, 06 May 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Google chrome Os
Linux
Linux linux Kernel
Microsoft
Microsoft windows
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Google chrome Os
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Wed, 06 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 06 May 2026 20:45:00 +0000

Type Values Removed Values Added
Title Insufficient Policy Enforcement in Chrome WebUI Allows Remote Site Isolation Bypass
First Time appeared Google
Google chrome
Weaknesses CWE-285
Vendors & Products Google
Google chrome

Wed, 06 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Insufficient policy enforcement in WebUI in Google Chrome on Linux, Mac, Windows, ChromeOS prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. (Chromium security severity: Medium)
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-06T21:57:16.938Z

Reserved: 2026-05-05T22:59:17.090Z

Link: CVE-2026-7946

cve-icon Vulnrichment

Updated: 2026-05-06T21:40:45.324Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-06T19:16:42.927

Modified: 2026-05-06T23:32:20.510

Link: CVE-2026-7946

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T03:30:20Z

Weaknesses