Impact
An integer overflow occurs while parsing XML documents in Google Chrome versions prior to 148.0.7778.168. The flaw allows an attacker to supply a malicious HTML page that, when viewed, causes the browser to execute arbitrary code inside its sandbox. This behaviour is classified as a high‑severity vulnerability by Chromium. The potential outcome is that the attacker can manipulate the browser process, potentially compromising the confidentiality or integrity of data visible to the browser, but the description does not indicate a guaranteed escape from the sandbox to the host operating system.
Affected Systems
Google Chrome for desktop operating systems. Any installation of Chrome older than version 148.0.7778.168 is susceptible. Chrome version 148.0.7778.168 and newer contain the fix.
Risk and Exploitability
The vulnerability can be triggered remotely via a crafted HTML page, requiring no authentication or local privileges. The CVSS score of 8.8 is reported, indicating high severity. EPSS is not available and the vulnerability is not listed in CISA KEV, indicating no known large‑scale exploitation campaigns. Nonetheless, the ability to run arbitrary code within the browser sandbox presents a serious risk to systems that allow untrusted web content.
OpenCVE Enrichment
Debian DSA