Description
Insufficient data validation in DataTransfer in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-05-06
Score: 4.2 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Google Chrome prior to 148.0.7778.96 contains a flaw where the DataTransfer API does not fully validate transferred data. A remote attacker who has compromised the renderer process can craft an HTML page that triggers the flaw, allowing them to read and write arbitrary memory within the renderer’s address space. This capability could be leveraged to elevate privileges or execute arbitrary code, and is rooted in an input validation weakness described by CWE‑20.

Affected Systems

All installations of Google Chrome using a version older than 148.0.7778.96 are affected, regardless of operating system. The issue is confined to the renderer process of the browser, which runs on Windows, macOS, Linux, and other supported platforms.

Risk and Exploitability

The CVSS score of 4.2 classifies the vulnerability as medium severity. EPSS is not available, indicating that a public exploitation probability estimate has not been published. The vulnerability is not listed in the CISA KEV catalog, suggesting no confirmed large‑scale exploit campaigns. Exploitation requires the attacker to first compromise the renderer process—often through cross‑site scripting or other local execution vectors—before the arbitrary memory read/write can be exercised. Given these constraints, the risk is limited to scenarios where renderer access is already achieved, but the impact within that process remains serious.

Generated by OpenCVE AI on May 7, 2026 at 00:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Chrome to version 148.0.7778.96 or later.
  • Apply or verify the browser’s sandboxing to reduce renderer privileges.
  • Monitor renderer processes for anomalous memory access or crashes that may indicate exploitation.

Generated by OpenCVE AI on May 7, 2026 at 00:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6250-1 chromium security update
History

Thu, 07 May 2026 01:00:00 +0000

Type Values Removed Values Added
Title Insufficient Data Validation in Chrome’s DataTransfer Enables Arbitrary Read/Write in Renderer

Wed, 06 May 2026 23:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Wed, 06 May 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 06 May 2026 22:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.2, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}


Wed, 06 May 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 06 May 2026 20:30:00 +0000

Type Values Removed Values Added
Title Insufficient Data Validation in Chrome’s DataTransfer Enables Arbitrary Read/Write in Renderer
Weaknesses CWE-20

Wed, 06 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Insufficient data validation in DataTransfer in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: Medium)
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-06T21:50:36.068Z

Reserved: 2026-05-05T22:59:28.892Z

Link: CVE-2026-7989

cve-icon Vulnrichment

Updated: 2026-05-06T21:34:44.188Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-06T19:16:49.783

Modified: 2026-05-06T23:20:26.663

Link: CVE-2026-7989

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T00:45:16Z

Weaknesses