Description
Use after free in Extensions in Google Chrome on Mac prior to 148.0.7778.168 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. (Chromium security severity: Medium)
Published: 2026-05-14
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A use‑after‑free flaw exists in the handling of Chrome extensions on macOS for versions prior to 148.0.7778.168. The defect allows an attacker who persuades a user to install a malicious extension to trigger a memory access after an object has been freed, resulting in arbitrary code execution. The weakness is classified as CWE‑416 and CWE‑825 and is rated medium severity by Chromium’s internal scoring system.

Affected Systems

Google Chrome for macOS is affected. Any installation of Chrome earlier than version 148.0.7778.168 is vulnerable, regardless of minor patch level.

Risk and Exploitability

The EPSS score is <1% and the vulnerability is not listed in CISA’s KEV catalog, indicating no known widespread exploitation. However, the flaw permits remote code execution once a user installs a malicious extension, so the attack requires user cooperation or deception. The intrinsic severity is high, but the impact of arbitrary code execution could be significant, warranting immediate attention.

Generated by OpenCVE AI on May 15, 2026 at 14:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Chrome to a version newer than 148.0.7778.168 via the official update channel
  • Remove any suspicious or untrusted extensions from the browser
  • Configure Chrome to restrict extensions to only those from the Chrome Web Store

Generated by OpenCVE AI on May 15, 2026 at 14:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6273-1 chromium security update
History

Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Title Use‑after‑Free in Chrome Extensions Allows Arbitrary Code Execution on macOS chromium-browser: chromium-browser: Use after free in Extensions
Weaknesses CWE-825
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 14 May 2026 23:30:00 +0000

Type Values Removed Values Added
Title Use‑after‑Free in Chrome Extensions Allows Arbitrary Code Execution on macOS

Thu, 14 May 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Thu, 14 May 2026 21:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Use after free in Extensions in Google Chrome on Mac prior to 148.0.7778.168 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. (Chromium security severity: Medium)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-15T03:56:23.086Z

Reserved: 2026-05-14T05:40:28.363Z

Link: CVE-2026-8587

cve-icon Vulnrichment

Updated: 2026-05-14T20:35:19.958Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T20:17:21.083

Modified: 2026-05-14T21:19:23.923

Link: CVE-2026-8587

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-14T19:52:45Z

Links: CVE-2026-8587 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T15:00:14Z

Weaknesses