Description
Use after free in Navigation in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-05-06
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A use‑after‑free flaw in the navigation handling of Google Chrome allows a malicious HTML page to exploit a renderer process that has already been compromised. The vulnerability can be leveraged to escape the browser’s sandbox, giving an attacker the ability to execute code outside the normal sandboxed environment. The weakness is a classic use‑after‑free bug (CWE‑416), and the Chromium tracker rates the severity as medium, but the CVSS score of 8.3 indicates a high‑impact vulnerability that threatens the confidentiality, integrity, and availability of the user’s system.

Affected Systems

Google Chrome versions prior to build 148.0.7778.96 are affected. The vulnerability targets the Chrome browser on all platforms that run these builds.

Risk and Exploitability

The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, which suggests it is not widely exploited in the wild at this time. However, the attack requires a remote attacker to serve a crafted HTML page and to have already gained control of the renderer process. If achieved, the sandbox escape could lead to arbitrary code execution on the host system. Given the high severity rating of CVSS 8.3 and the potentially high impact of a sandbox escape, the vulnerability warrants prompt remediation.

Generated by OpenCVE AI on May 7, 2026 at 00:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 148.0.7778.96 or later to eliminate the use‑after‑free bug.
  • Verify that the browser is running with the default sandbox enabled and that the renderer process is isolated from system privileges.
  • Keep the operating system and all other software up‑to‑date, as auxiliary safeguards against exploitation.

Generated by OpenCVE AI on May 7, 2026 at 00:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Wed, 06 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 May 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 06 May 2026 20:00:00 +0000

Type Values Removed Values Added
Title Use‑After‑Free in Navigation Leading to Sandbox Escape via Crafted HTML Page

Wed, 06 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Use after free in Navigation in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-07T03:56:19.681Z

Reserved: 2026-05-05T22:59:19.701Z

Link: CVE-2026-7956

cve-icon Vulnrichment

Updated: 2026-05-06T19:34:41.222Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-06T19:16:44.010

Modified: 2026-05-07T02:06:06.320

Link: CVE-2026-7956

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T00:15:05Z

Weaknesses