Description
Inappropriate implementation in ServiceWorker in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-05-06
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the ServiceWorker implementation of Google Chrome before version 148.0.7778.96 allows a remote attacker who has already compromised the renderer process to craft an HTML page that can potentially escape the sandbox, giving the attacker elevated privileges. This can lead to access to restricted resources, data theft, or further system compromise. The vulnerability is classified as medium severity by Chromium’s security team and reflects improper authorization and privilege management weaknesses (CWE‑693).

Affected Systems

Google Chrome browsers with versions prior to 148.0.7778.96 are affected, including all older stable releases. Affected users should verify that their installations are up to date or plan an upgrade.

Risk and Exploitability

The attack requires that the adversary already compromise the renderer process, which is a prerequisite that limits the likelihood of exploitation. Because EPSS is unavailable and the vulnerability is not listed in the CISA KEV catalog, the risk is considered moderate but still actionable. The CVSS score is 8.3, indicating high severity. Exploitation would proceed via a crafted HTML page that leverages the bug in the ServiceWorker sandbox to escape isolation boundaries.

Generated by OpenCVE AI on May 7, 2026 at 03:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Chrome to version 148.0.7778.96 or newer, which contains the ServiceWorker sandbox escape fix.
  • Restrict or disable ServiceWorker registration for untrusted or unknown origins using enterprise policy or site‑level settings (e.g., set ServiceWorkerEnabled=false for specific URLs).
  • Implement monitoring of renderer process integrity and use OS‑level sandboxing or application control to detect and prevent renderer compromise.

Generated by OpenCVE AI on May 7, 2026 at 03:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6250-1 chromium security update
History

Thu, 07 May 2026 04:15:00 +0000

Type Values Removed Values Added
Title Chrome ServiceWorker Sandbox Escape via Crafted HTML

Thu, 07 May 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Thu, 07 May 2026 01:00:00 +0000

Type Values Removed Values Added
Title ServiceWorker Sandbox Escape in Chrome via Compromised Renderer
Weaknesses CWE-269
CWE-285

Wed, 06 May 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 May 2026 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 06 May 2026 22:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-693
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}


Wed, 06 May 2026 20:45:00 +0000

Type Values Removed Values Added
Title ServiceWorker Sandbox Escape in Chrome via Compromised Renderer
Weaknesses CWE-269
CWE-285

Wed, 06 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Inappropriate implementation in ServiceWorker in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-07T03:56:17.382Z

Reserved: 2026-05-05T22:59:21.773Z

Link: CVE-2026-7963

cve-icon Vulnrichment

Updated: 2026-05-06T19:29:07.032Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-06T19:16:46.450

Modified: 2026-05-07T02:02:48.450

Link: CVE-2026-7963

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T04:00:14Z

Weaknesses