Impact
Google Chrome versions earlier than 148.0.7778.96 contain a use‑after‑free bug in the TopChrome module. An attacker that has already compromised the renderer process can exploit this flaw to escape Chrome’s sandbox, gaining higher privileges or executing arbitrary code within that process. The weakness is classified as CWE‑416 and is considered a medium‑severity issue by the Chromium security team.
Affected Systems
All users running Google Chrome variants before version 148.0.7778.96 are at risk, including typical desktop installations. The vulnerability is specific to the renderer process of the Chrome browser and does not affect other components such as the extension framework or the rendering engine code directly.
Risk and Exploitability
The EPSS score is not available, and the flaw is not listed in CISA’s KEV catalog. The CVSS score of 8.3 indicates high severity. The likely attack vector is a crafted HTML page that triggers the use‑after‑free in a renderer process that the attacker has already compromised. If the sandbox escape succeeds, the attacker can elevate privileges or execute arbitrary code, potentially compromising the entire system.
OpenCVE Enrichment
Debian DSA