Description
Inappropriate implementation in Chromoting in Google Chrome prior to 148.0.7778.168 allowed a local attacker to bypass discretionary access control via a malicious file. (Chromium security severity: Medium)
Published: 2026-05-14
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Chromoting in Google Chrome allows a local attacker to bypass discretionary access control by executing a malicious file; this can lead to escalation of privileges on the host system. The vulnerability is an inappropriate implementation that fails to enforce proper file permissions, thereby permitting unauthorized operations. The weakness is characterized by CWE‑284 (Improper Access Control) and CWE‑639 (Account or Resource Discovery). The impact is limited to local systems where an attacker can place a crafted file, as no network component is involved.

Affected Systems

Affected systems are users running Google Chrome with a version prior to 148.0.7778.168 on any platform that supports Chromoting. No other vendors or products are listed as impacted, and the only explicit version coverage is the pre‑148.0.7778.168 range.

Risk and Exploitability

The vulnerability carries a medium severity rating, with a CVSS score of 5.5 according to Chromium's own assessment. The EPSS score of <1% indicates a very low probability of exploitation. The exploit requires local file placement and execution, making it dependent on user interaction or compromised local processes. Because the vulnerability is not listed in the CISA KEV catalog, there is no evidence of widespread exploitation, but the local nature of the threat means any user with sufficient local access could gain elevated privileges. Updating to the patched Chrome release removes the flaw and is available via the standard stable channel update channel.

Generated by OpenCVE AI on May 15, 2026 at 16:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to the latest patched version
  • Ensure Chrome's automatic update mechanism is enabled to receive future security patches promptly
  • Use file‑integrity monitoring or anti‑malware solutions to detect and block unknown executable files in Chrome's installation directories

Generated by OpenCVE AI on May 15, 2026 at 16:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6273-1 chromium security update
History

Fri, 15 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 3.9, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}


Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Title Local Privilege Escalation via Malicious File in Chrome Chromoting chromium-browser: chromium-browser: Inappropriate implementation in Chromoting
Weaknesses CWE-639
References
Metrics threat_severity

None

cvssV3_1

{'score': 3.9, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}

threat_severity

Moderate


Thu, 14 May 2026 22:45:00 +0000

Type Values Removed Values Added
Title Local Privilege Escalation via Malicious File in Chrome Chromoting
Weaknesses CWE-284

Thu, 14 May 2026 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Thu, 14 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Inappropriate implementation in Chromoting in Google Chrome prior to 148.0.7778.168 allowed a local attacker to bypass discretionary access control via a malicious file. (Chromium security severity: Medium)
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-15T13:42:14.929Z

Reserved: 2026-05-14T05:40:28.165Z

Link: CVE-2026-8586

cve-icon Vulnrichment

Updated: 2026-05-15T13:38:28.487Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-14T20:17:20.990

Modified: 2026-05-15T15:16:56.460

Link: CVE-2026-8586

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-14T19:52:44Z

Links: CVE-2026-8586 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T16:15:03Z

Weaknesses