Description
Insufficient policy enforcement in AI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to bypass Site Isolation via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-05-14
Score: 3.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An AI policy enforcement weakness in Google Chrome versions before 148.0.7778.168 allows a remote attacker who has compromised the renderer process to bypass the browser’s Site Isolation boundary by loading a specially crafted HTML page. This bypass removes the separation normally enforced between sites, giving the attacker the ability to read or manipulate data from other origins and to execute actions that are normally restricted to a single site context. The flaw is rated Medium by the Chromium security team.

Affected Systems

Any desktop installation of Google Chrome older than version 148.0.7778.168 is susceptible. The issue exists in the Chrome renderer process that handles HTML pages, independent of the operating system, as it is part of the same compile‑time code base for all desktop platforms.

Risk and Exploitability

The CVSS score of 3.1 rates this vulnerability as Low severity. The EPSS score of <1% suggests exploitation is unlikely to be widely observed at present, and the flaw is not listed in CISA’s KEV catalog. The flaw requires a prior compromise of a renderer process; if such access is obtained, the attacker could use a specially crafted HTML page to bypass Chrome’s Site Isolation, enabling cross‑origin data access or manipulation. Overall, the risk is low given the need for a precondition but remains limited by the low exploitation probability indicated by the EPSS metric.

Generated by OpenCVE AI on May 15, 2026 at 17:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 148.0.7778.168 or newer.
  • If a patch cannot be applied immediately, consider disabling or limiting AI features until a fix is deployed.
  • Monitor for new security updates from Google and apply them promptly.

Generated by OpenCVE AI on May 15, 2026 at 17:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6273-1 chromium security update
History

Fri, 15 May 2026 15:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-275
CWE-276

Fri, 15 May 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-693
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}


Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Title Bypass of Site Isolation via AI Policy Enforcement Flaw in Google Chrome chromium-browser: chromium-browser: Insufficient policy enforcement in AI
Weaknesses CWE-1100
References
Metrics threat_severity

None

cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N'}

threat_severity

Moderate


Thu, 14 May 2026 22:30:00 +0000

Type Values Removed Values Added
Title Bypass of Site Isolation via AI Policy Enforcement Flaw in Google Chrome
Weaknesses CWE-275
CWE-276

Thu, 14 May 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Thu, 14 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Insufficient policy enforcement in AI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to bypass Site Isolation via a crafted HTML page. (Chromium security severity: Medium)
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-15T13:56:29.754Z

Reserved: 2026-05-14T05:40:24.102Z

Link: CVE-2026-8568

cve-icon Vulnrichment

Updated: 2026-05-15T13:56:24.915Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-14T20:17:19.017

Modified: 2026-05-15T15:16:55.583

Link: CVE-2026-8568

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-14T19:52:32Z

Links: CVE-2026-8568 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T17:45:04Z

Weaknesses