Description
Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-05-14
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A use‑after‑free flaw in Chrome’s UI side chain triggers when native objects in the renderer process are freed incorrectly, allowing a malicious page to access memory that has already been released. The attacker can then use this condition to escape the renderer sandbox via a crafted HTML page. The flaw is a classic example of CWE‑416, where a null or dangling pointer is dereferenced after free, and it also maps to CWE‑825, which denotes information exposure through unintended memory disclosure after use‑after‑free.

Affected Systems

Google Chrome versions prior to 148.0.7778.168. Any user running a pre‑update Chrome may be vulnerable if their renderer process can be compromised by a crafted HTML page.

Risk and Exploitability

The CVE has a CVSS score of 8.3, indicating a high‑severity issue. EPSS data is not available and the vulnerability is not yet in the CISA KEV catalog. The exploit requires the attacker already to compromise the renderer process, after which a sandbox escape becomes possible. Attackers could deliver malicious content via a crafted HTML page served from an untrusted site. Based on the description, this is inferred because the exploit requires the attacker to compromise the renderer process and then use a crafted HTML page. The use‑after‑free flaw also falls under CWE‑825, potentially exposing sensitive data from the renderer process during the escape. The lack of an EPSS score or KEV status does not diminish the risk if the vulnerability is exploited in the wild.

Generated by OpenCVE AI on May 15, 2026 at 13:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Chrome to a version at or above 148.0.7778.168, which contains a safe‑free fix for the renderer UI.
  • Enable or maintain automatic Chrome updates to ensure future patches are applied without manual intervention.
  • Limit execution of untrusted content by disabling or restricting legacy plugin support and preventing elevated privileges for content loaded through HTML files.

Generated by OpenCVE AI on May 15, 2026 at 13:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6273-1 chromium security update
History

Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Title chromium-browser: chromium-browser: Use after free in UI
Weaknesses CWE-825
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 15 May 2026 00:00:00 +0000

Type Values Removed Values Added
Title Use After Free in Chrome Renderer Allows Sandbox Escape

Thu, 14 May 2026 22:15:00 +0000

Type Values Removed Values Added
Title Use After Free in Chrome Renderer Allows Sandbox Escape
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Thu, 14 May 2026 21:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-15T03:57:13.106Z

Reserved: 2026-05-14T05:40:25.587Z

Link: CVE-2026-8575

cve-icon Vulnrichment

Updated: 2026-05-14T21:03:49.555Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T20:17:19.863

Modified: 2026-05-14T22:16:51.050

Link: CVE-2026-8575

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-14T19:52:39Z

Links: CVE-2026-8575 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T14:00:21Z

Weaknesses