Impact
A use‑after‑free in Chrome’s FileSystem component can be triggered by a crafted HTML page that forces a user to perform certain UI gestures. The flaw allows a remote attacker to escape from the Chrome sandbox, potentially enabling execution of arbitrary code outside the browser. The vulnerability maps to CWE‑416, a classic use‑after‑free condition.
Affected Systems
Google Chrome versions before 148.0.7778.168 are vulnerable. The issue exists only in desktop releases of Chrome and is not present in Chromium versions newer than 148.0.7778.168.
Risk and Exploitability
The CVSS score of 8.3 indicates a high severity. The risk remains high because the attack requires the user to open a malicious page, yet it can lead to sandbox escape and code execution. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, but its critical severity implies a strong likelihood of exploitation by threat actors. The attack path is inferred to involve user interaction with a malicious web page delivered over the network. The exploit can be carried out only after the victim has performed specific UI gestures that trigger the use‑after‑free.
OpenCVE Enrichment
Debian DSA