Description
Insufficient policy enforcement in GPU in Google Chrome on Android prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-05-14
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Google Chrome for Android contains insufficient policy enforcement in its GPU implementation. A remote attacker who has already gained control of the renderer process can use a specially crafted HTML page to bypass the GPU sandbox and potentially escape to the host system. This enables compromise of the device, including execution of arbitrary code, data exfiltration, or other malicious actions on the affected device. The weakness corresponds to CWE‑266: Least Privilege Violation and CWE‑693: Control Flow Logic Error.

Affected Systems

Android devices running Google Chrome versions prior to 148.0.7778.168 are vulnerable. The affected software is Chrome’s GPU subsystem, which is part of the browser’s rendering engine. The specific version range is all releases before the 148.0.7778.168 update announced in May 2026.

Risk and Exploitability

The EPSS score is not available and the vulnerability is not listed in CISA’s KEV catalog. The described attack requires an attacker to first compromise the renderer process, which is non‑trivial but feasible if other browser weaknesses are exploited. The CVSS severity reported by Chromium is 8.3, indicating high risk. Given the lack of widespread public exploitation and high severity, the overall risk is considered moderate, but any compromise of the renderer process could lead to full device takeover.

Generated by OpenCVE AI on May 15, 2026 at 13:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Chrome to version 148.0.7778.168 or newer, which fixes the control flow logic error flaw (CWE‑693).
  • Disable GPU hardware acceleration in Chrome settings to reduce exposure; this mitigates the effect of the control flow logic error by limiting GPU usage.
  • Restart the browser after applying the update to ensure policy changes take effect.

Generated by OpenCVE AI on May 15, 2026 at 13:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6273-1 chromium security update
History

Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Title Insufficient GPU Policy Enforcement Enables Sandbox Escape in Google Chrome for Android chromium-browser: chromium-browser: Insufficient policy enforcement in GPU
Weaknesses CWE-266
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 15 May 2026 01:45:00 +0000

Type Values Removed Values Added
Title Insufficient GPU Policy Enforcement Enables Sandbox Escape in Google Chrome for Android

Fri, 15 May 2026 00:30:00 +0000

Type Values Removed Values Added
Title Chrome GPU Sandbox Escape via Malicious HTML Page
Weaknesses CWE-285

Thu, 14 May 2026 22:45:00 +0000

Type Values Removed Values Added
Title Chrome GPU Sandbox Escape via Malicious HTML Page
Weaknesses CWE-285

Thu, 14 May 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Weaknesses CWE-693
Vendors & Products Google
Google chrome
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Insufficient policy enforcement in GPU in Google Chrome on Android prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-15T03:57:23.850Z

Reserved: 2026-05-14T05:40:24.736Z

Link: CVE-2026-8571

cve-icon Vulnrichment

Updated: 2026-05-14T21:17:43.290Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T20:17:19.383

Modified: 2026-05-14T22:16:50.597

Link: CVE-2026-8571

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-14T19:52:33Z

Links: CVE-2026-8571 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T13:45:16Z

Weaknesses