Description
Insufficient validation of untrusted input in SiteIsolation in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-05-06
Score: 3.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from insufficient validation of untrusted input within Chrome’s SiteIsolation component. In versions earlier than 148.0.7778.96 a specially crafted HTML document can trick the renderer process into treating data from one origin as if it were from another. This allows an attacker who has already compromised the renderer to read or otherwise manipulate information belonging to a protected site, effectively sidestepping Chrome’s isolation safeguards.

Affected Systems

The flaw affects all installations of Google Chrome running any operating system prior to version 148.0.7778.96. It applies to the stable channel and any prior builds that have not received the official fix.

Risk and Exploitability

The vulnerability is labeled as Medium severity by Chromium, with a CVSS score of 3.1, no EPSS score is available, and it is not listed in the CISA KEV catalog. The attack requires the attacker to first compromise the renderer process, which can be achieved through malicious web content or malicious extensions. Although this raises the effort barrier, the presence of a feasible attack vector means that organizations should prioritize updating Chrome to the patched release.

Generated by OpenCVE AI on May 7, 2026 at 00:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Chrome to version 148.0.7778.96 or later to apply the SiteIsolation fix.
  • Review installed extensions for elevated privileges and remove any that are unnecessary or untrusted, as they can facilitate renderer compromise.
  • Maintain the latest operating‑system security patches to reduce the likelihood that a renderer process is compromised from a malicious site.
  • Consider enabling stricter browser policy settings that enforce renderer isolation or isolate devtools contexts, if supported by your environment.

Generated by OpenCVE AI on May 7, 2026 at 00:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Thu, 07 May 2026 01:00:00 +0000

Type Values Removed Values Added
Title Chrome Site Isolation Bypass via Crafted HTML

Wed, 06 May 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 06 May 2026 22:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}


Wed, 06 May 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 06 May 2026 21:15:00 +0000

Type Values Removed Values Added
Title Chrome Site Isolation Bypass via Crafted HTML

Wed, 06 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Insufficient validation of untrusted input in SiteIsolation in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. (Chromium security severity: Medium)
Weaknesses CWE-20
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-06T21:54:04.881Z

Reserved: 2026-05-05T22:59:22.584Z

Link: CVE-2026-7966

cve-icon Vulnrichment

Updated: 2026-05-06T19:25:59.244Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-06T19:16:47.223

Modified: 2026-05-07T02:02:16.627

Link: CVE-2026-7966

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T00:45:16Z

Weaknesses