Description
Use after free in GPU in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-05-06
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a use‑after‑free bug in the GPU component of Google Chrome before version 148.0.7778.96. When a remote attacker can compromise the renderer process, a specially crafted HTML page can trigger the bug, allowing the attacker to escape the renderer sandbox and execute code with higher privileges.

Affected Systems

All machines running Google Chrome earlier than 148.0.7778.96 on any supported operating system with GPU acceleration enabled are affected. No specific operating‑system limitation is mentioned, so any platform that runs the vulnerable Chrome version is at risk.

Risk and Exploitability

The CVE has a CVSS score of 8.3, EPSS data is unavailable, and it is not listed in the CISA KEV catalog. The attack vector requires a compromised renderer process, which is typically achieved by a user visiting malicious web content. Successful exploitation could lead to sandbox escape and local code execution, potentially enabling further attacks. Given the prevalence of Chrome and the ease of delivering a crafted web page, the risk remains significant until a patch is applied.

Generated by OpenCVE AI on May 7, 2026 at 00:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Chrome to version 148.0.7778.96 or later on all affected installations.
  • Launch Chrome with the "--disable-gpu" flag to temporarily disable GPU acceleration until the official patch is available.
  • After applying the update, restart all Chrome processes to ensure the improved versions are active.

Generated by OpenCVE AI on May 7, 2026 at 00:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6250-1 chromium security update
History

Thu, 07 May 2026 01:00:00 +0000

Type Values Removed Values Added
Title GPU Use‑After‑Free Enabling Potential Sandbox Escape in Chrome

Wed, 06 May 2026 23:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Wed, 06 May 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 May 2026 22:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}


Wed, 06 May 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 06 May 2026 20:45:00 +0000

Type Values Removed Values Added
Title GPU Use‑After‑Free Enabling Potential Sandbox Escape in Chrome

Wed, 06 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Use after free in GPU in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-07T03:56:09.217Z

Reserved: 2026-05-05T22:59:27.819Z

Link: CVE-2026-7985

cve-icon Vulnrichment

Updated: 2026-05-06T19:14:19.243Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-06T19:16:49.383

Modified: 2026-05-06T23:21:23.023

Link: CVE-2026-7985

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T00:45:16Z

Weaknesses