Description
Use after free in Downloads in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)
Published: 2026-05-14
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A use‑after‑free bug in the Downloads component of Google Chrome on macOS permits a remote attacker to run arbitrary code by delivering a specially crafted HTML page. The flaw originates from freeing memory prematurely, exposing data that can be incorrectly accessed during subsequent processing of a download. Additionally, the bug results in improper resource cleanup (CWE‑825), further complicating the memory state. The resulting capability enables full control of the affected system, making it a critical threat to confidentiality, integrity, and availability.

Affected Systems

Google Chrome for macOS versions earlier than 148.0.7778.168 are vulnerable. The issue specifically targets the Downloads feature used when a user interacts with HTML content that references downloaded files. No other browsers or platforms are listed as affected.

Risk and Exploitability

The lack of an EPSS score indicates that publicly known exploitation activity has not yet been quantified, but the CVSS score of 8.8 indicates a high severity rating. The vulnerability involves a use‑after‑free (CWE‑416) and an improper resource cleanup (CWE‑825) in the Downloads module, allowing a remote attacker to present a malicious HTML page that triggers the download process. Because the flaw can lead to arbitrary code execution, the potential damage is substantial if the attacker succeeds. The CVE is not listed in CISA’s KEV catalog at this time.

Generated by OpenCVE AI on May 15, 2026 at 13:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to version 148.0.7778.168 or later. This patch removes the use‑after‑free condition in the Downloads module.
  • If an immediate update is not possible, apply a Chrome policy to disable or restrict the Downloads functionality until the update arrives; for example, set "DownloadEnabled" to false via enterprise policy or local group policy. This limits the attack surface by preventing the vulnerable code path from being exercised.
  • Maintain end‑to‑end monitoring of web content for known malicious domains and enforce strict content‑security policies that prevent execution of downloaded code from untrusted sources.

Generated by OpenCVE AI on May 15, 2026 at 13:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6273-1 chromium security update
History

Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Title chromium-browser: chromium-browser: Use after free in Downloads
Weaknesses CWE-825
References
Metrics threat_severity

None

threat_severity

Critical


Thu, 14 May 2026 23:30:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Thu, 14 May 2026 23:00:00 +0000

Type Values Removed Values Added
Title Use‑After‑Free in Chrome Downloads Allows Remote Code Execution on macOS

Thu, 14 May 2026 22:30:00 +0000

Type Values Removed Values Added
Title Use‑After‑Free in Chrome Downloads Allows Remote Code Execution on macOS

Thu, 14 May 2026 21:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Use after free in Downloads in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-15T03:56:31.581Z

Reserved: 2026-05-14T05:40:13.325Z

Link: CVE-2026-8522

cve-icon Vulnrichment

Updated: 2026-05-14T20:36:52.549Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T20:17:12.973

Modified: 2026-05-14T21:19:23.923

Link: CVE-2026-8522

cve-icon Redhat

Severity : Critical

Publid Date: 2026-05-14T19:52:15Z

Links: CVE-2026-8522 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T13:30:45Z

Weaknesses