Description
Insufficient validation of untrusted input in DataTransfer in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Critical)
Published: 2026-05-14
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from insufficient validation of untrusted input in the DataTransfer component of Google Chrome. An attacker can craft a web page that, once a user engages in specific UI gestures, causes Chrome to expose sensitive data from its process memory. The result is that an attacker may read confidential information, potentially including credentials or other secrets, from the victim’s memory space. The weakness is identified as CWE-20 (Improper Input Validation) and CWE-1286 (Insufficient Process Boundaries).

Affected Systems

Google Chrome versions prior to 148.0.7778.168 are affected. The issue was present in all builds before this update within the stable channel.

Risk and Exploitability

Chromium classifies the severity as Critical, but the CVSS score of 5.3 indicates a moderate severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. The attack requires a remote attacker to host a specially crafted HTML page and convince a user to perform certain UI gestures. Once the gesture occurs, the flaw enables reading of the Chrome process memory, exposing potentially sensitive data. This risk is moderate and the likelihood cannot be quantified without the EPSS metric.

Generated by OpenCVE AI on May 15, 2026 at 13:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Chrome to version 148.0.7778.168 or later to apply the official fix.
  • If an instant update is not feasible, use Chrome enterprise policies to block or restrict sites from executing clipboard (DataTransfer) operations, preventing the exploit path.
  • Apply group-policy or local-policy settings that limit clipboard read/write access for untrusted sites until a patch is available.

Generated by OpenCVE AI on May 15, 2026 at 13:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6273-1 chromium security update
History

Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Title chromium-browser: chromium-browser: Insufficient validation of untrusted input in DataTransfer
Weaknesses CWE-1286
References
Metrics threat_severity

None

threat_severity

Critical


Fri, 15 May 2026 00:15:00 +0000

Type Values Removed Values Added
Title Remote DataTransfer Exploit in Chrome Reveals Process Memory

Thu, 14 May 2026 22:15:00 +0000

Type Values Removed Values Added
Title Remote DataTransfer Exploit in Chrome Reveals Process Memory
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 May 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Thu, 14 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Insufficient validation of untrusted input in DataTransfer in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Critical)
Weaknesses CWE-20
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-14T21:33:49.533Z

Reserved: 2026-05-14T05:40:11.943Z

Link: CVE-2026-8516

cve-icon Vulnrichment

Updated: 2026-05-14T21:33:43.176Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T20:17:12.320

Modified: 2026-05-14T22:16:45.980

Link: CVE-2026-8516

cve-icon Redhat

Severity : Critical

Publid Date: 2026-05-14T19:52:13Z

Links: CVE-2026-8516 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T13:30:45Z

Weaknesses