Description
Insufficient validation of untrusted input in ChromeDriver in Google Chrome on Windows prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Low)
Published: 2026-05-06
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Google Chrome on Windows has a flaw in ChromeDriver where untrusted input from a crafted HTML page is not properly validated, allowing an attacker to run arbitrary code. The weakness is classified as CWE-20 (Improper Input Validation). Because the code runs within the Chrome process, a successful exploitation would compromise the machine that hosts the vulnerable Chrome installation, granting the attacker full control. Chromium flags the issue as low severity, but the nature of the vulnerability raises the risk of remote exploitation.

Affected Systems

The flaw affects ChromeDriver components in Google Chrome for Windows editions that are scheduled prior to version 148.0.7778.96. Users who have not yet updated beyond this version are at risk; all other recent Chrome releases after this update are considered secure.

Risk and Exploitability

The CVSS score is 8.8, and the EPSS score is < 1%, indicating a very low but nonzero exploitation probability. Since the flaw allows RCE from a crafted HTML page, the attack vector is inferred to be remote via a browser or ChromeDriver session, and exploitation would require the attacker to host a malicious page or otherwise get ChromeDriver to load it. The standalone solution is to update Chrome to a patched build, after which no known exploitation vectors remain. This vulnerability is not listed in the CISA KEV catalog.

Generated by OpenCVE AI on May 7, 2026 at 15:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 148.0.7778.96 or later, ensuring all ChromeDriver binaries are updated as well
  • Restart any services that use ChromeDriver to load the new binaries into memory
  • Restrict the exposure of ChromeDriver to trusted networks or authenticated users until the patch is applied

Generated by OpenCVE AI on May 7, 2026 at 15:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6250-1 chromium security update
History

Thu, 07 May 2026 16:15:00 +0000

Type Values Removed Values Added
Title ChromeDriver Improper Input Validation Enables Remote Code Execution on Windows

Thu, 07 May 2026 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Thu, 07 May 2026 01:15:00 +0000

Type Values Removed Values Added
Title Insufficient Input Validation in ChromeDriver Enables Remote Code Execution

Wed, 06 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 May 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 06 May 2026 21:15:00 +0000

Type Values Removed Values Added
Title Insufficient Input Validation in ChromeDriver Enables Remote Code Execution

Wed, 06 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Insufficient validation of untrusted input in ChromeDriver in Google Chrome on Windows prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Low)
Weaknesses CWE-20
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-07T03:55:53.104Z

Reserved: 2026-05-05T22:59:31.786Z

Link: CVE-2026-8000

cve-icon Vulnrichment

Updated: 2026-05-06T18:47:05.518Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-06T19:16:50.953

Modified: 2026-05-07T13:39:07.147

Link: CVE-2026-8000

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T16:00:12Z

Weaknesses