Description
Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Published: 2026-05-14
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A use‑after‑free flaw was discovered in the core of Google Chrome on Windows before version 148.0.7778.168. The vulnerability allows an attacker who has already compromised the renderer process to trigger a sandbox escape by delivering a specially crafted HTML page. Based on this, it is inferred that the attacker could execute arbitrary code with elevated privileges, thereby impacting confidentiality, integrity, and availability.

Affected Systems

The flaw applies to Google Chrome installations on Windows running any version older than 148.0.7778.168; all users of the affected releases are at risk.

Risk and Exploitability

The EPSS score is reported as less than 1%, showing a very low exploitation probability. The CVSS score of 8.3 indicates high severity. The vulnerability is not listed in the CISA KEV catalog. Based on the attack vector described, it is inferred that an attacker would need to serve a malicious page to a compromised renderer, a capability that can be achieved over the network, and that this scenario may have a low likelihood of exploitation due to the requirement of a pre‑existing compromise.

Generated by OpenCVE AI on May 15, 2026 at 15:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to version 148.0.7778.168 or later, which fixes the use‑after‑free (CWE‑416) and memory corruption (CWE‑825) vulnerabilities.
  • Enable automatic updates for Google Chrome so that future fixes are applied without manual intervention
  • Ensure that all browser extensions and plugins are up to date, as they can interact with the renderer process and increase attack surface

Generated by OpenCVE AI on May 15, 2026 at 15:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6273-1 chromium security update
History

Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Title Use‑After‑Free Enables Sandbox Escape in Chrome for Windows chromium-browser: chromium-browser: Use after free in Core
Weaknesses CWE-825
References
Metrics threat_severity

None

threat_severity

Important


Thu, 14 May 2026 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Thu, 14 May 2026 22:00:00 +0000

Type Values Removed Values Added
Title Use‑After‑Free Enables Sandbox Escape in Chrome for Windows

Thu, 14 May 2026 21:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-15T03:57:10.165Z

Reserved: 2026-05-14T05:40:18.194Z

Link: CVE-2026-8542

cve-icon Vulnrichment

Updated: 2026-05-14T21:03:51.597Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T20:17:15.070

Modified: 2026-05-14T22:16:48.273

Link: CVE-2026-8542

cve-icon Redhat

Severity : Important

Publid Date: 2026-05-14T19:52:23Z

Links: CVE-2026-8542 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T15:45:02Z

Weaknesses