Description
Use after free in WebRTC in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-05-06
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A use‑after‑free vulnerability in the WebRTC component of Google Chrome allows a remote attacker to craft an HTML page that triggers code execution inside a sandboxed browser process. The flaw, classified as CWE‑416, occurs when the browser accesses memory after it has been freed, enabling the attacker to inject or overwrite executable payloads. Although the target process is sandboxed, a successful exploit can gain privileges beyond the sandbox, potentially compromising system confidentiality or integrity.

Affected Systems

The defect affects all installations of Google Chrome with versions earlier than 148.0.7778.96, regardless of operating system. Users on Windows, macOS, Linux, and other supported platforms exposed to malicious web content are vulnerable.

Risk and Exploitability

The attacker only needs the victim to load a crafted web page; no local privileges or special network configuration are required. EPSS data is not available, and the vulnerability is not listed in CISA KEV, but the CVSS score of 8.8 indicates a serious risk. The flaw permits execution within the sandboxed browser process, which limits the impact to the data and processes that the sandbox can access. Because the attack requires no privileged user interaction and targets any user visiting malicious content, prompt remediation is advised.

Generated by OpenCVE AI on May 7, 2026 at 00:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to version 148.0.7778.96 or later to eliminate the bug.
  • If immediate update is not possible, disable WebRTC by setting the "enable-webrtc" policy to false or adjusting the chrome://flags switch, reducing the attack vector.
  • Monitor web traffic and browser logs for suspicious WebRTC activity and block malicious content from untrusted domains while remediation steps are in place.

Generated by OpenCVE AI on May 7, 2026 at 00:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6250-1 chromium security update
History

Thu, 07 May 2026 01:15:00 +0000

Type Values Removed Values Added
Title Remote Code Execution via WebRTC Use‑After‑Free in Chrome

Wed, 06 May 2026 23:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Wed, 06 May 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 May 2026 22:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Wed, 06 May 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 06 May 2026 20:30:00 +0000

Type Values Removed Values Added
Title Remote Code Execution via WebRTC Use‑After‑Free in Chrome

Wed, 06 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Use after free in WebRTC in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-07T03:55:57.863Z

Reserved: 2026-05-05T22:59:28.339Z

Link: CVE-2026-7987

cve-icon Vulnrichment

Updated: 2026-05-06T18:50:32.011Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-06T19:16:49.577

Modified: 2026-05-06T23:20:47.043

Link: CVE-2026-7987

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T01:00:14Z

Weaknesses