Description
Insufficient validation of untrusted input in DevTools in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-05-06
Score: 3.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises when DevTools does not properly validate untrusted input, allowing a remote attacker who has already compromised the renderer process to craft a malicious HTML page that leaks cross‑origin data. This flaw permits unauthorized disclosure of information that should be protected by the same‑origin policy, potentially exposing sensitive data such as session tokens, cookies, or local storage from another origin.

Affected Systems

Google Chrome browsers with versions earlier than 148.0.7778.96 are affected. The problem is fixed in the 148.0.7778.96 release, so any installation running a prior version is vulnerable.

Risk and Exploitability

EPSS data is not available and the flaw is not listed in the CISA KEV catalog. The Chromium security severity is rated medium; the CVSS score is 3.1. The attack requires the attacker to have already compromised the renderer process, which usually implies execution of code in a web page context or a malicious extension. Because no public exploit code is known, the risk is moderate but still serious for environments that allow arbitrary web content to be rendered.

Generated by OpenCVE AI on May 6, 2026 at 23:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Chrome to version 148.0.7778.96 or later.
  • Restrict or disable DevTools access for untrusted users or workstations within your organization.
  • Implement monitoring for anomalous DevTools usage or unexpected cross‑origin data access attempts.

Generated by OpenCVE AI on May 6, 2026 at 23:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6250-1 chromium security update
History

Thu, 07 May 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Thu, 07 May 2026 00:15:00 +0000

Type Values Removed Values Added
Title Cross‑Origin Data Leak via Untrusted DevTools Input in Google Chrome

Wed, 06 May 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 06 May 2026 22:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}


Wed, 06 May 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 06 May 2026 20:45:00 +0000

Type Values Removed Values Added
Title Cross‑Origin Data Leak via Untrusted DevTools Input in Google Chrome

Wed, 06 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Insufficient validation of untrusted input in DevTools in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)
Weaknesses CWE-20
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-06T21:54:14.258Z

Reserved: 2026-05-05T22:59:22.326Z

Link: CVE-2026-7965

cve-icon Vulnrichment

Updated: 2026-05-06T19:26:16.463Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-06T19:16:47.053

Modified: 2026-05-07T02:02:26.503

Link: CVE-2026-7965

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T00:00:13Z

Weaknesses