Description
Integer overflow in Network in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-05-06
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An integer overflow in the Network module of Google Chrome controls how the renderer process parses certain HTML constructs. The flaw permits a remote attacker who has already compromised the renderer to craft a malicious HTML page that causes the overflow, subverting the same‑origin enforcement. The resulting bypass can expose cross‑origin data, inject unauthorized scripts, and facilitate further exploitation of the user’s environment. The issue is classified as Medium severity by Chromium, indicating a meaningful but not critical risk when conditions for exploitation are met.

Affected Systems

Google Chrome versions prior to 148.0.7778.96 on desktop platforms are affected. Users must verify their installed version and upgrade if earlier.

Risk and Exploitability

The CVSS score of 4.3 signifies a medium severity level. No EPSS score is publicly available and the vulnerability is not listed in CISA's KEV catalog, which places the exploitation probability in a moderate band. Exploitation requires a remote attacker who has already compromised the renderer process, indicating that the attack vector is through a crafted HTML page served to the user. If successfully leveraged, the attacker can override the browser's same‑origin policy to read or manipulate data from another domain, potentially enabling data theft or session hijacking.

Generated by OpenCVE AI on May 7, 2026 at 00:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 148.0.7778.96 or later.
  • Enable Site Isolation (policy or flag) to isolate renderer processes and limit their privileges.
  • Disable or uninstall any extensions that load arbitrary HTML content or interact with network requests.

Generated by OpenCVE AI on May 7, 2026 at 00:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6250-1 chromium security update
History

Thu, 07 May 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Thu, 07 May 2026 01:00:00 +0000

Type Values Removed Values Added
Title Remote Same‑Origin Policy Bypass via Integer Overflow in Chrome Network Layer

Wed, 06 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 06 May 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 06 May 2026 20:45:00 +0000

Type Values Removed Values Added
Title Remote Same‑Origin Policy Bypass via Integer Overflow in Chrome Network Layer

Wed, 06 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Integer overflow in Network in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)
Weaknesses CWE-472
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-06T21:53:36.654Z

Reserved: 2026-05-05T22:59:23.391Z

Link: CVE-2026-7969

cve-icon Vulnrichment

Updated: 2026-05-06T21:38:36.545Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-06T19:16:47.710

Modified: 2026-05-07T02:01:44.223

Link: CVE-2026-7969

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T00:45:16Z

Weaknesses