Description
Insufficient validation of untrusted input in CORS in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-05-06
Score: 3.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an insufficient validation of untrusted input in the CORS handling code of Google Chrome, which permits an attacker who has already compromised the renderer process to bypass the browser’s same‑origin policy using a specially crafted HTML page. This can enable the attacker to read or modify data that would otherwise be protected by the same‑origin restriction, potentially exposing user data or compromising the integrity of the web page. The weakness is identified as CWE‑20 (Improper Input Validation).

Affected Systems

Google Chrome browsers running any version preceding 148.0.7778.96 are affected. The issue was present in all channels (stable, beta, dev) prior to the 148.0.7778.96 release when the CORS validation logic was corrected.

Risk and Exploitability

The CVSS score is 3.1, indicating low severity. The exploit probability is not quantified because EPSS is not available, and the vulnerability is not listed in the CISA KEV catalog. The practical exploitability requires first compromising the renderer process, which generally means the user must visit malicious content or be affected by another flaw that can reach the renderer. Consequently, the risk level can be considered medium, but organizations should monitor for emerging exploitation techniques and enforce regular updates to Chrome.

Generated by OpenCVE AI on May 7, 2026 at 00:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to the latest stable release (148.0.7778.96 or newer).
  • If an immediate update is not possible, isolate browsers that access untrusted content or use a sandboxed profile to reduce exposure of the renderer process.
  • Keep an eye on Google’s release notes and apply security patches promptly when new versions are available.

Generated by OpenCVE AI on May 7, 2026 at 00:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6250-1 chromium security update
History

Thu, 07 May 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Thu, 07 May 2026 01:00:00 +0000

Type Values Removed Values Added
Title CORS Validation Bypass in Google Chrome Allowing Same‑Origin Policy Violation

Wed, 06 May 2026 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 06 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 06 May 2026 20:45:00 +0000

Type Values Removed Values Added
Title CORS Validation Bypass in Google Chrome Allowing Same‑Origin Policy Violation

Wed, 06 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Insufficient validation of untrusted input in CORS in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)
Weaknesses CWE-20
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-06T21:53:46.027Z

Reserved: 2026-05-05T22:59:23.164Z

Link: CVE-2026-7968

cve-icon Vulnrichment

Updated: 2026-05-06T21:38:52.710Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-06T19:16:47.573

Modified: 2026-05-07T02:01:55.287

Link: CVE-2026-7968

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T00:45:16Z

Weaknesses