Impact
A use‑after‑free flaw exists in the handling of Chrome extensions on macOS for versions prior to 148.0.7778.168. The defect allows an attacker who persuades a user to install a malicious extension to trigger a memory access after an object has been freed, resulting in arbitrary code execution. The weakness is classified as CWE‑416 and CWE‑825 and is rated medium severity by Chromium’s internal scoring system.
Affected Systems
Google Chrome for macOS is affected. Any installation of Chrome earlier than version 148.0.7778.168 is vulnerable, regardless of minor patch level.
Risk and Exploitability
The EPSS score is <1% and the vulnerability is not listed in CISA’s KEV catalog, indicating no known widespread exploitation. However, the flaw permits remote code execution once a user installs a malicious extension, so the attack requires user cooperation or deception. The intrinsic severity is high, but the impact of arbitrary code execution could be significant, warranting immediate attention.
OpenCVE Enrichment
Debian DSA