Description
Use after free in Blink in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)
Published: 2026-05-14
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Use after free in the Blink rendering engine of Google Chrome prior to build 148.0.7778.168 allows a remote attacker to execute arbitrary code inside a sandboxed process by loading a specially crafted HTML page. The flaw arises from incorrectly freeing memory while it is still in use, enabling the attacker to inject and run code that runs with sandboxed privileges.

Affected Systems

All users with Google Chrome installed on desktop platforms running any build before 148.0.7778.168 are vulnerable. The issue is confined to the Blink rendering engine in Chrome and does not affect other browsers or prior Chrome releases.

Risk and Exploitability

The vulnerability is rated Critical by Chromium and carries a CVSS score of 8.8. It can be triggered remotely by delivering malicious web content that is viewed in the vulnerable Chrome instance. An EPSS score of < 1% is reported, indicating a very low but non‑zero exploitation probability, and the vulnerability is not currently listed in the CISA KEV catalog, indicating that public exploits are not yet known. Nevertheless, the high severity, lack of mitigations in older builds, and potential for arbitrary code execution inside the sandbox make it a high‑risk vulnerability for all exposed users.

Generated by OpenCVE AI on May 15, 2026 at 14:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade all Chrome installations to build 148.0.7778.168 or later to eliminate the use‑after‑free bug.
  • Configure enterprise policy or use management tools to enforce automatic updates and prevent rollbacks to the vulnerable build.
  • Until the update is applied, restrict browsing to trusted sites and block access to untrusted content that could contain crafted HTML.

Generated by OpenCVE AI on May 15, 2026 at 14:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6273-1 chromium security update
History

Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Title Blink Use-After-Free Enables Remote Code Execution Inside Sandboxed Chrome Process chromium-browser: chromium-browser: Use after free in Blink
Weaknesses CWE-825
References
Metrics threat_severity

None

threat_severity

Critical


Thu, 14 May 2026 23:15:00 +0000

Type Values Removed Values Added
Title Blink Use-After-Free Enables Remote Code Execution Inside Sandboxed Chrome Process

Thu, 14 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Thu, 14 May 2026 21:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Use after free in Blink in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-15T03:56:34.545Z

Reserved: 2026-05-14T05:40:12.377Z

Link: CVE-2026-8518

cve-icon Vulnrichment

Updated: 2026-05-14T20:36:53.543Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T20:17:12.550

Modified: 2026-05-14T21:19:23.923

Link: CVE-2026-8518

cve-icon Redhat

Severity : Critical

Publid Date: 2026-05-14T19:52:14Z

Links: CVE-2026-8518 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T15:00:14Z

Weaknesses