Description
Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Published: 2026-05-14
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A use‑after‑free vulnerability in Mojo within Google Chrome permits a remote attacker who has compromised the renderer process to escape the sandbox, potentially enabling arbitrary code execution. The flaw is classified as CWE‑416 and CWE‑825 and is considered high severity by Chromium security. The vulnerability arises when a crafted HTML page causes the renderer to access freed memory, leading to a sandbox escape.

Affected Systems

Google Chrome versions prior to 148.0.7778.168 on all supported operating systems are affected. Users running any earlier Chrome release must update to the fixed version. The issue does not impact only a specific platform but spans all desktop editions where the renderer process can be exploited.

Risk and Exploitability

The exploit requires a compromised renderer process, which a remote attacker may obtain through a malicious web page or other content. Because the EPSS score is not available and the vulnerability is not listed in CISA’s KEV catalog, the current exploitation probability is uncertain, though the high severity rating indicates a potentially severe impact should exploitation succeed. The CVSS score of 8.3 indicates high severity. The attack vector is remote via crafted HTML, implying that any user browsing malicious content could be at risk if unpatched.

Generated by OpenCVE AI on May 15, 2026 at 13:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 148.0.7778.168 or later to contain the use‑after‑free fix.
  • Ensure that Chrome’s built‑in sandbox is enabled and not overridden by policy or extensions that disable process isolation.
  • Monitor for anomalous renderer behavior or attempts at sandbox escape, and consider using stricter content filtering or network policies to block suspicious HTML content.

Generated by OpenCVE AI on May 15, 2026 at 13:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6273-1 chromium security update
History

Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Title Use-After‑Free in Chrome's Mojo Enables Potential Sandbox Escape chromium-browser: chromium-browser: Use after free in Mojo
Weaknesses CWE-825
References
Metrics threat_severity

None

threat_severity

Important


Thu, 14 May 2026 23:00:00 +0000

Type Values Removed Values Added
Title Use-After-Free in Chrome's Mojo Enables Potential Sandbox Escape Use-After‑Free in Chrome's Mojo Enables Potential Sandbox Escape

Thu, 14 May 2026 22:30:00 +0000

Type Values Removed Values Added
Title Use-After-Free in Chrome's Mojo Enables Potential Sandbox Escape

Thu, 14 May 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Thu, 14 May 2026 21:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-15T03:57:00.366Z

Reserved: 2026-05-14T05:40:13.592Z

Link: CVE-2026-8523

cve-icon Vulnrichment

Updated: 2026-05-14T21:03:54.622Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T20:17:13.080

Modified: 2026-05-14T22:16:46.400

Link: CVE-2026-8523

cve-icon Redhat

Severity : Important

Publid Date: 2026-05-14T19:52:15Z

Links: CVE-2026-8523 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T14:00:21Z

Weaknesses