Description
Use after free in FileSystem in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
Published: 2026-05-14
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A use‑after‑free in Chrome’s FileSystem component can be triggered by a crafted HTML page that forces a user to perform certain UI gestures. The flaw allows a remote attacker to escape from the Chrome sandbox, potentially enabling execution of arbitrary code outside the browser. The vulnerability maps to CWE‑416, a classic use‑after‑free condition.

Affected Systems

Google Chrome versions before 148.0.7778.168 are vulnerable. The issue exists only in desktop releases of Chrome and is not present in Chromium versions newer than 148.0.7778.168.

Risk and Exploitability

The CVSS score of 8.3 indicates a high severity. The risk remains high because the attack requires the user to open a malicious page, yet it can lead to sandbox escape and code execution. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, but its critical severity implies a strong likelihood of exploitation by threat actors. The attack path is inferred to involve user interaction with a malicious web page delivered over the network. The exploit can be carried out only after the victim has performed specific UI gestures that trigger the use‑after‑free.

Generated by OpenCVE AI on May 15, 2026 at 13:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 148.0.7778.168 or later to remove the use‑after‑free flaw.
  • Enable automatic updates so that future security patches are applied without manual intervention.
  • Monitor Chrome security release notes for additional mitigations if the firmware update is delayed or unavailable.

Generated by OpenCVE AI on May 15, 2026 at 13:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6273-1 chromium security update
History

Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Title chromium-browser: chromium-browser: Use after free in FileSystem
Weaknesses CWE-825
References
Metrics threat_severity

None

threat_severity

Critical


Fri, 15 May 2026 00:30:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Thu, 14 May 2026 23:45:00 +0000

Type Values Removed Values Added
Title Use-After-Free in Chrome FileSystem Enabling Possible Sandbox Escape

Thu, 14 May 2026 22:15:00 +0000

Type Values Removed Values Added
Title Use-After-Free in Chrome FileSystem Enabling Possible Sandbox Escape
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Use after free in FileSystem in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-15T03:56:53.683Z

Reserved: 2026-05-14T05:40:10.867Z

Link: CVE-2026-8512

cve-icon Vulnrichment

Updated: 2026-05-14T21:00:46.958Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T20:17:11.830

Modified: 2026-05-14T22:16:45.417

Link: CVE-2026-8512

cve-icon Redhat

Severity : Critical

Publid Date: 2026-05-14T19:52:11Z

Links: CVE-2026-8512 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T13:30:45Z

Weaknesses