Description
Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-05-14
Score: 9.6 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A use‑after‑free vulnerability in the Mojo messaging framework of Google Chrome, identified as CWE‑416 and CWE‑825, permits a malicious HTML page to trigger undefined memory behavior. When exploited, the flaw can lead a remote attacker to escape the browser sandbox and execute code with higher privileges on the host operating system.

Affected Systems

All Google Chrome stable‑channel installations earlier than version 148.0.7778.168 on any operating system are affected. Users on the stable channel should ensure they have installed the latest update released by Google.

Risk and Exploitability

The CVE carries a CVSS score of 9.6, an EPSS score of less than 1%, and is not listed in CISA’s KEV catalog. Exploitation can be performed remotely via a crafted web page, after which the attacker may compromise the confidentiality and integrity of the operating system by breaking out of the sandbox. While no widespread exploitation has been reported at the time of this analysis, the high severity and remote nature of the attack vector warrant immediate attention.

Generated by OpenCVE AI on May 15, 2026 at 15:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to the latest stable release.
  • Enable automatic updates on all devices to ensure the patch is applied without manual action.
  • If an immediate update is not possible, restrict browser usage to trusted sites, use Chrome’s guest mode or a sandboxed profile to limit the scope of potential compromise.

Generated by OpenCVE AI on May 15, 2026 at 15:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6273-1 chromium security update
History

Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Title Chrome Use‑After‑Free Leads to Potential Sandbox Escape chromium-browser: chromium-browser: Use after free in Mojo
Weaknesses CWE-825
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 14 May 2026 23:00:00 +0000

Type Values Removed Values Added
Title Chrome Use‑After‑Free Leads to Potential Sandbox Escape

Thu, 14 May 2026 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Thu, 14 May 2026 21:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-15T03:56:50.582Z

Reserved: 2026-05-14T05:40:26.773Z

Link: CVE-2026-8580

cve-icon Vulnrichment

Updated: 2026-05-14T20:56:46.869Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T20:17:20.367

Modified: 2026-05-14T21:19:23.923

Link: CVE-2026-8580

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-14T19:52:41Z

Links: CVE-2026-8580 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T15:30:02Z

Weaknesses