Description
Use after free in ReadingMode in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-05-06
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a use‑after‑free flaw in Google Chrome’s ReadingMode feature. It permits an attacker who can influence the renderer process, likely by supplying malicious web content, to trigger code execution inside a sandboxed renderer by loading a specially crafted HTML page. Success would give the attacker arbitrary code execution within the renderer sandbox, likely allowing further privilege escalation through known sandbox escape techniques. The weakness is identified as CWE‑416.

Affected Systems

Google Chrome browsers prior to version 148.0.7778.96 are affected. Users running the stable channel of Chrome below this version should verify their install against the latest release.

Risk and Exploitability

The flaw carries a high severity rating according to its CVSS score of 8.8. Attackers would need to compromise the renderer process, likely by supplying malicious web content. No publicly known exploits are listed in the CISA KEV catalog and the EPSS score is unavailable, indicating uncertainty about the exploitation probability. Nonetheless, the presence of a use‑after‑free bug that leads to code execution warrants prompt attention.

Generated by OpenCVE AI on May 6, 2026 at 23:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Chrome to version 148.0.7778.96 or later to eliminate the use‑after‑free bug.
  • Configure local or enterprise policy to disable the ReadingMode feature until a patch is available.
  • Apply strict content security policies to limit renderer process interaction with untrusted content and reduce the opportunity for exploit.

Generated by OpenCVE AI on May 6, 2026 at 23:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6250-1 chromium security update
History

Thu, 07 May 2026 00:15:00 +0000

Type Values Removed Values Added
Title Use‑After‑Free in Chrome ReadingMode Enables Remote Code Execution via Crafted HTML Page

Wed, 06 May 2026 23:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Wed, 06 May 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 May 2026 22:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Wed, 06 May 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 06 May 2026 21:15:00 +0000

Type Values Removed Values Added
Title Use‑After‑Free in Chrome ReadingMode Enables Remote Code Execution via Crafted HTML Page

Wed, 06 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Use after free in ReadingMode in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-07T03:56:00.356Z

Reserved: 2026-05-05T22:59:27.551Z

Link: CVE-2026-7984

cve-icon Vulnrichment

Updated: 2026-05-06T18:52:19.659Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-06T19:16:49.280

Modified: 2026-05-06T23:21:35.400

Link: CVE-2026-7984

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T00:00:13Z

Weaknesses