Description
Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
Published: 2026-05-14
Score: 9.6 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A use‑after‑free flaw in the Chrome browser’s user interface allows a remote attacker to exploit a crafted HTML page and potentially escape the renderer sandbox, giving the attacker the ability to run code with the privileges of the browser process. The vulnerability is categorized as CWE‑416 and CWE‑825, indicating classic use‑after‑free and memory corruption weaknesses that can lead to arbitrary code execution. The impact is therefore high, as successful exploitation could compromise system integrity, confidentiality, and availability by allowing the attacker to execute arbitrary code.

Affected Systems

Google Chrome versions prior to 148.0.7778.168 on all supported operating systems are affected. The fix is distributed in the Chrome release that starts with the version number 148.0.7778.168. Users of earlier builds should plan to upgrade to this version or later.

Risk and Exploitability

The flaw has a CVSS score of 9.6, indicating a Critical severity, suggesting that the vulnerability is significant. No EPSS score is currently available, so the exact likelihood of exploitation in the wild is unknown, but because the attack vector is remote and the payload can be driven through a crafted HTML page, the risk is non‑trivial for any user that accepts potentially malicious web content. The vulnerability is not yet listed in CISA’s KEV catalog, indicating that no confirmed public exploits have been reported at the time of this analysis. Users should assume that a remote attacker could trigger the use‑after‑free if they can deliver malicious HTML to the browser, and therefore consider the risk substantial.

Generated by OpenCVE AI on May 15, 2026 at 13:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 148.0.7778.168 or later, which contains the fix for the use‑after‑free issue.
  • Ensure Chrome’s auto‑update feature is enabled so future patches are applied automatically.
  • Use Safe Browsing and enforce stricter URL filtering or a content security policy to block malicious sites until the browser is upgraded.

Generated by OpenCVE AI on May 15, 2026 at 13:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6273-1 chromium security update
History

Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Title Use‑After‑Free in Chrome UI Enabling Potential Sandbox Escape chromium-browser: chromium-browser: Use after free in UI
Weaknesses CWE-825
References
Metrics threat_severity

None

threat_severity

Critical


Thu, 14 May 2026 23:00:00 +0000

Type Values Removed Values Added
Title Use‑After‑Free in Chrome UI Enabling Potential Sandbox Escape
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Thu, 14 May 2026 21:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-15T03:56:52.134Z

Reserved: 2026-05-14T05:40:10.520Z

Link: CVE-2026-8511

cve-icon Vulnrichment

Updated: 2026-05-14T20:58:06.030Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T20:17:11.707

Modified: 2026-05-14T21:19:23.923

Link: CVE-2026-8511

cve-icon Redhat

Severity : Critical

Publid Date: 2026-05-14T19:52:10Z

Links: CVE-2026-8511 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T14:00:21Z

Weaknesses