Impact
A use–after–free bug in Chrome on Android before version 148.0.7778.168 allows a remote attacker who has already compromised the renderer process to run code outside the browser sandbox. The flaw can lead to execution of arbitrary code with the privileges of the renderer, potentially compromising the device. The weakness is identified as CWE-416 and CWE-825.
Affected Systems
The vulnerability affects Google Chrome on Android versions earlier than 148.0.7778.168. This includes all Android builds that ship the affected Chrome binary. No other products or operating systems are mentioned in the advisory.
Risk and Exploitability
The issue is rated critical by Chromium and has a CVSS score of 8.3. EPSS score not available. It is not listed in the CISA KEV catalog. The likely attack vector requires that the attacker already gain a foothold in the renderer process – which can be achieved through malicious web content or other supply‑chain techniques. Once that condition is satisfied, the use‑after‑free can be triggered by a crafted HTML page to escape the sandbox. Addressing the flaw with a patch is the preferred mitigation.
OpenCVE Enrichment
Debian DSA