Impact
The vulnerability is an access control weakness in Google Chrome’s navigation handling before version 148.0.7778.96. A remote attacker who has already compromised a renderer process can craft a malicious HTML page that triggers the flaw and bypasses Chrome’s site isolation boundaries. Based on the description, it is inferred that bypassing site isolation may allow the attacker to access content from other sites.
Affected Systems
Google Chrome desktop releases with versions earlier than 148.0.7778.96 are affected. The issue is specific to the renderer process and applies to Windows, macOS, and Linux desktop environments.
Risk and Exploitability
The CVSS score is 3.1, indicating a low overall severity. Exploitation requires a preceding compromise of the renderer process, which limits the attack surface to systems where malicious code has already been introduced via an exploit or a rogue extension. The lack of an EPSS score and absence from CISA’s KEV catalog suggest that the vulnerability is not currently widely exploited. Nevertheless, once the renderer is compromised, the flaw could lead to a breach of confidentiality or integrity for data from other origins.
OpenCVE Enrichment