Description
Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Published: 2026-05-14
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Chromium's Accessibility component contains a use‑after‑free error that allows a malicious HTML page to access freed memory. If an attacker has already compromised the renderer process, the flaw can be leveraged to escape Chrome's sandbox and execute arbitrary code. The weakness is a classic use‑after‑free (CWE‑416) and involves dangerous memory handling (CWE‑825), potentially compromising confidentiality, integrity, and availability of the victim system.

Affected Systems

The CVE does not provide explicit affected‑version data; it is inferred that Chrome versions prior to 148.0.7778.168 may be vulnerable. The data also does not specify mobile or enterprise deployments, so it is uncertain if those are affected.

Risk and Exploitability

The CVSS score is 8.3, indicating a high severity flaw. The flaw is not listed in the CISA Known Exploited Vulnerabilities catalog. No EPSS score is available, but the attack requires a compromised renderer process and a crafted HTML page; it is inferred that exploitation would be easier from URLs controlled by the attacker. Because the CVE is marked as Chromium high severity, organizations should consider it a high‑risk issue until the browser patch is applied.

Generated by OpenCVE AI on May 15, 2026 at 14:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 148.0.7778.168 or newer.
  • Enable automatic updates so new security patches are installed without manual intervention.
  • Avoid browsing untrusted or suspicious websites until the browser update is applied.

Generated by OpenCVE AI on May 15, 2026 at 14:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6273-1 chromium security update
History

Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Title chromium-browser: chromium-browser: Use after free in Accessibility
Weaknesses CWE-825
References
Metrics threat_severity

None

threat_severity

Important


Fri, 15 May 2026 00:30:00 +0000

Type Values Removed Values Added
Title Use-After-Free in Chrome Accessibility Allows Remote Sandbox Escape

Thu, 14 May 2026 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Thu, 14 May 2026 22:00:00 +0000

Type Values Removed Values Added
Title Use-After-Free in Chrome Accessibility Allows Remote Sandbox Escape

Thu, 14 May 2026 21:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-15T03:57:04.440Z

Reserved: 2026-05-14T05:40:16.035Z

Link: CVE-2026-8533

cve-icon Vulnrichment

Updated: 2026-05-14T21:03:52.588Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T20:17:14.137

Modified: 2026-05-14T22:16:47.413

Link: CVE-2026-8533

cve-icon Redhat

Severity : Important

Publid Date: 2026-05-14T19:52:20Z

Links: CVE-2026-8533 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T14:15:51Z

Weaknesses