Impact
Chromium's Accessibility component contains a use‑after‑free error that allows a malicious HTML page to access freed memory. If an attacker has already compromised the renderer process, the flaw can be leveraged to escape Chrome's sandbox and execute arbitrary code. The weakness is a classic use‑after‑free (CWE‑416) and involves dangerous memory handling (CWE‑825), potentially compromising confidentiality, integrity, and availability of the victim system.
Affected Systems
The CVE does not provide explicit affected‑version data; it is inferred that Chrome versions prior to 148.0.7778.168 may be vulnerable. The data also does not specify mobile or enterprise deployments, so it is uncertain if those are affected.
Risk and Exploitability
The CVSS score is 8.3, indicating a high severity flaw. The flaw is not listed in the CISA Known Exploited Vulnerabilities catalog. No EPSS score is available, but the attack requires a compromised renderer process and a crafted HTML page; it is inferred that exploitation would be easier from URLs controlled by the attacker. Because the CVE is marked as Chromium high severity, organizations should consider it a high‑risk issue until the browser patch is applied.
OpenCVE Enrichment
Debian DSA