Description
Use after free in TopChrome in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-05-06
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Google Chrome versions earlier than 148.0.7778.96 contain a use‑after‑free bug in the TopChrome module. An attacker that has already compromised the renderer process can exploit this flaw to escape Chrome’s sandbox, gaining higher privileges or executing arbitrary code within that process. The weakness is classified as CWE‑416 and is considered a medium‑severity issue by the Chromium security team.

Affected Systems

All users running Google Chrome variants before version 148.0.7778.96 are at risk, including typical desktop installations. The vulnerability is specific to the renderer process of the Chrome browser and does not affect other components such as the extension framework or the rendering engine code directly.

Risk and Exploitability

The EPSS score is not available, and the flaw is not listed in CISA’s KEV catalog. The CVSS score of 8.3 indicates high severity. The likely attack vector is a crafted HTML page that triggers the use‑after‑free in a renderer process that the attacker has already compromised. If the sandbox escape succeeds, the attacker can elevate privileges or execute arbitrary code, potentially compromising the entire system.

Generated by OpenCVE AI on May 7, 2026 at 00:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to version 148.0.7778.96 or later to remove the use‑after‑free bug.
  • Verify that Chromium sandboxing is active, ensuring that renderer processes run with least privilege and that no policies disable or weaken the sandbox.
  • Avoid allowing untrusted content to load in the renderer by blocking or sanitizing potential attack vectors such as on‑click events or external data sources.

Generated by OpenCVE AI on May 7, 2026 at 00:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6250-1 chromium security update
History

Thu, 07 May 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Thu, 07 May 2026 01:00:00 +0000

Type Values Removed Values Added
Title Use-After-Free Vulnerability Allowing Sandbox Escape in Chrome

Wed, 06 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 May 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 06 May 2026 20:45:00 +0000

Type Values Removed Values Added
Title Use-After-Free Vulnerability Allowing Sandbox Escape in Chrome

Wed, 06 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Use after free in TopChrome in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-07T03:56:15.166Z

Reserved: 2026-05-05T22:59:23.649Z

Link: CVE-2026-7970

cve-icon Vulnrichment

Updated: 2026-05-06T19:23:46.695Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-06T19:16:47.857

Modified: 2026-05-07T02:01:34.800

Link: CVE-2026-7970

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T00:45:16Z

Weaknesses