Impact
An insufficient policy enforcement bug in Chrome extensions allowed a remote attacker who had already compromised the renderer process to bypass discretionary access control by loading a crafted HTML page. The vulnerability enables the attacker to make the renderer perform privileged actions, such as accessing files or executing code on the host, elevating the attacker’s privileges within the browser sandbox. It carries a Chromium security severity of Medium.
Affected Systems
Google Chrome on all desktop platforms. Versions prior to 148.0.7778.96 are affected. The vulnerability is tied to the Chrome rendering engine and applies to all operating systems that run the desktop browser.
Risk and Exploitability
The CVSS score of 4.2 and the EPSS score is unavailable, so the exploitation probability is unclear. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an attacker to have already compromised the renderer process, typically via a local or historically privileged attack vector. Once the renderer is compromised, the crafted HTML page can be delivered to elevate privileges within that process. The absence of a publicly available zero‑day exploit and the need for prior renderer compromise suggest the risk is moderate, but the potential impact remains significant for affected users.
OpenCVE Enrichment
Debian DSA