Description
Use after free in Network in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Published: 2026-05-14
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability is a use‑after‑free condition (CWE‑416) in Google Chrome’s Network component on Windows, and it also includes an unchecked buffer copy (CWE‑825) during network initialization. An attacker who has already compromised a renderer process can trigger the flaw by delivering a specially crafted HTML page, potentially leading to a sandbox escape. Once outside the renderer’s restricted environment, the attacker may execute arbitrary code with browser process privileges, compromising system confidentiality and integrity.

Affected Systems

Google Chrome for Windows is affected on all releases prior to version 148.0.7778.168. Users running any earlier Windows build must update to 148.0.7778.168 or later to mitigate the issue.

Risk and Exploitability

Chromium classifies the severity as High with a CVSS score of 8.3; no EPSS score is available and the vulnerability is not listed in the CISA KEV catalog, indicating that exploitation is not widely reported. The attack vector requires an attacker to have a foothold in the renderer process, commonly through malicious web content or a local compromise, and to serve the crafted HTML that triggers the use‑after‑free. Until the patch is applied, the risk of unauthorized code execution on a victim’s Windows system remains significant.

Generated by OpenCVE AI on May 15, 2026 at 14:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 148.0.7778.168 or later.
  • Synchronize the update across all managed devices using endpoint or group policy to ensure immediate deployment.
  • Until the update is in place, avoid browsing untrusted or unknown websites that could serve malicious HTML, and consider running Chrome in a restricted environment or using the built‑in sandbox features.

Generated by OpenCVE AI on May 15, 2026 at 14:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6273-1 chromium security update
History

Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Title Use After Free in Chrome Network Component Enables Sandbox Escape via Crafted HTML on Windows chromium-browser: chromium-browser: Use after free in Network
Weaknesses CWE-825
References
Metrics threat_severity

None

threat_severity

Important


Thu, 14 May 2026 22:00:00 +0000

Type Values Removed Values Added
Title Use After Free in Chrome Network Component Enables Sandbox Escape via Crafted HTML on Windows
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Thu, 14 May 2026 21:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Use after free in Network in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-15T03:57:02.496Z

Reserved: 2026-05-14T05:40:15.331Z

Link: CVE-2026-8530

cve-icon Vulnrichment

Updated: 2026-05-14T21:03:53.651Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T20:17:13.827

Modified: 2026-05-14T22:16:47.130

Link: CVE-2026-8530

cve-icon Redhat

Severity : Important

Publid Date: 2026-05-14T19:52:19Z

Links: CVE-2026-8530 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T14:15:51Z

Weaknesses