Description
Insufficient policy enforcement in WebXR in Google Chrome on Android prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-05-14
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Insufficient policy enforcement in the WebXR API on Android Chrome before 148.0.7778.168 allows an attacker who has already compromised the renderer process to read sensitive data from the process memory by loading a crafted HTML page. The flaw bypasses the sandbox policy protecting rendering memory, exposing potentially confidential information such as tokens or session data. The weakness falls under CWE‑280 and CWE‑693.

Affected Systems

Google Chrome for Android versions earlier than 148.0.7778.168 are affected. The vulnerability is documented for the stable channel and appears in releases prior to the highlighted version.

Risk and Exploitability

The CVSS score is 5.3, indicating medium severity. EPSS score < 1% suggests a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires a remote attacker to first compromise the renderer process; once that is achieved, the attacker can read arbitrary process memory via a crafted HTML page. The attack vector is remote but depends on renderer compromise.

Generated by OpenCVE AI on May 15, 2026 at 14:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Chrome on Android to the latest stable release (≥148.0.7778.168) as soon as possible.
  • If an immediate update is not feasible, disable the WebXR API through chrome://flags by setting the WebXR flag to Disabled to prevent the vulnerable code from executing.
  • Limit user exposure to JavaScript‑heavy or untrusted web content that may activate WebXR, and ensure that third‑party apps are sandboxed and verified to avoid renderer compromise.

Generated by OpenCVE AI on May 15, 2026 at 14:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6273-1 chromium security update
History

Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Title Insufficient Policy Enforcement in WebXR Enables Renderer Memory Disclosure chromium-browser: chromium-browser: Insufficient policy enforcement in WebXR
Weaknesses CWE-280
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 15 May 2026 02:15:00 +0000

Type Values Removed Values Added
Title Insufficient Policy Enforcement in WebXR Enables Renderer Memory Disclosure

Fri, 15 May 2026 00:30:00 +0000

Type Values Removed Values Added
Title WebXR Policy Bypass Allows Remote Memory Read on Android Chrome
Weaknesses CWE-200

Thu, 14 May 2026 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Thu, 14 May 2026 22:15:00 +0000

Type Values Removed Values Added
Title WebXR Policy Bypass Allows Remote Memory Read on Android Chrome
Weaknesses CWE-200
CWE-693
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Insufficient policy enforcement in WebXR in Google Chrome on Android prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-14T21:20:18.776Z

Reserved: 2026-05-14T05:40:27.495Z

Link: CVE-2026-8583

cve-icon Vulnrichment

Updated: 2026-05-14T21:20:14.846Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T20:17:20.703

Modified: 2026-05-14T22:16:51.373

Link: CVE-2026-8583

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-14T19:52:43Z

Links: CVE-2026-8583 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T14:30:46Z

Weaknesses