Description
Use after free in Blink in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-05-06
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A use‑after‑free flaw exists in the Blink rendering engine of Google Chrome prior to version 148.0.7778.96. When a victim opens a specially crafted HTML page, an out‑of‑bounds read/write can occur, allowing an attacker to run arbitrary code that initially executes inside the Chrome sandbox. The flaw is a classic memory‑corruption vulnerability (CWE‑416) that can lead to remote code execution with sandboxed privileges.

Affected Systems

Google Chrome browsers older than 148.0.7778.96 that run on Windows, macOS, and Linux desktop operating systems are affected. The vulnerability is present in all builds of Chrome shipped before the 148.0.7778.96 update, regardless of the device or architecture, but only these desktop platforms are listed in the available CPE data.

Risk and Exploitability

The attack can be triggered by loading a malicious web page; no special privileges are required from the victim. EPSS is not available, and the flaw is not listed in the CISA KEV catalog. However, the CVSS score of 8.8 indicates a high risk of remote code execution. An attacker that succeeds could potentially escape the sandbox, enabling lateral movement or privilege escalation within the host system if other local weaknesses exist.

Generated by OpenCVE AI on May 7, 2026 at 01:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to version 148.0.7778.96 or later on all affected machines.
  • Configure Chrome Enterprise policies to enforce site isolation and strengthen sandboxing.
  • Review and restrict extensions that run with elevated privileges, removing those that are unnecessary for users.

Generated by OpenCVE AI on May 7, 2026 at 01:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6250-1 chromium security update
History

Thu, 07 May 2026 01:30:00 +0000

Type Values Removed Values Added
Title Use‑After‑Free in Blink Enables Remote Code Execution via Crafted HTML

Wed, 06 May 2026 23:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Wed, 06 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 May 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 06 May 2026 20:45:00 +0000

Type Values Removed Values Added
Title Use‑After‑Free in Blink Enables Remote Code Execution via Crafted HTML

Wed, 06 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Use after free in Blink in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-07T03:56:12.725Z

Reserved: 2026-05-05T22:59:24.680Z

Link: CVE-2026-7974

cve-icon Vulnrichment

Updated: 2026-05-06T19:20:03.128Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-06T19:16:48.273

Modified: 2026-05-06T23:28:48.393

Link: CVE-2026-7974

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T01:15:17Z

Weaknesses