Impact
A use‑after‑free bug in Chrome's printing subsystem allows a renderer process that has been compromised to access freed memory and execute code, leading to a sandbox escape. This flaw, identified as CWE‑416, could enable an attacker to run arbitrary code on the host after manipulating a specially crafted HTML page. The vulnerability is rated low by Chromium's internal severity, but the potential impact of escaping the sandbox makes it a serious concern for end users.
Affected Systems
Google Chrome versions released prior to 148.0.7778.96 on Linux, macOS, and ChromeOS are affected.
Risk and Exploitability
The CVSS score is 8.3, and no EPSS value is listed in the available data. The bug requires the attacker to have already compromised the renderer process, limiting the likelihood of exploitation. Nevertheless, a sandbox escape could result in full system compromise. The flaw is not yet listed in CISA's KEV catalog.
OpenCVE Enrichment