Description
Use After Free in Printing in Google Chrome on Linux, Mac, ChromeOS prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Low)
Published: 2026-05-06
Score: 8.3 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A use‑after‑free bug in Chrome's printing subsystem allows a renderer process that has been compromised to access freed memory and execute code, leading to a sandbox escape. This flaw, identified as CWE‑416, could enable an attacker to run arbitrary code on the host after manipulating a specially crafted HTML page. The vulnerability is rated low by Chromium's internal severity, but the potential impact of escaping the sandbox makes it a serious concern for end users.

Affected Systems

Google Chrome versions released prior to 148.0.7778.96 on Linux, macOS, and ChromeOS are affected.

Risk and Exploitability

The CVSS score is 8.3, and no EPSS value is listed in the available data. The bug requires the attacker to have already compromised the renderer process, limiting the likelihood of exploitation. Nevertheless, a sandbox escape could result in full system compromise. The flaw is not yet listed in CISA's KEV catalog.

Generated by OpenCVE AI on May 7, 2026 at 00:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 148.0.7778.96 or later on all affected systems.
  • If immediate upgrade is not possible, disable printing through Chrome policies or remove printer drivers to prevent the exploit.
  • Monitor Chrome rendering activity or print job logs for anomalous behavior as a supplemental precaution.

Generated by OpenCVE AI on May 7, 2026 at 00:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 01:15:00 +0000

Type Values Removed Values Added
Title Use‑After‑Free in Chrome Printing Allows Potential Sandbox Escape

Wed, 06 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 May 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 06 May 2026 20:30:00 +0000

Type Values Removed Values Added
Title Use‑After‑Free in Chrome Printing Allows Potential Sandbox Escape

Wed, 06 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Use After Free in Printing in Google Chrome on Linux, Mac, ChromeOS prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Low)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-07T03:56:55.965Z

Reserved: 2026-05-05T22:59:32.099Z

Link: CVE-2026-8001

cve-icon Vulnrichment

Updated: 2026-05-06T21:23:52.405Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-06T19:16:51.073

Modified: 2026-05-06T22:16:43.980

Link: CVE-2026-8001

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T01:00:14Z

Weaknesses