Description
Inappropriate implementation in UI in Google Chrome on Windows prior to 148.0.7778.179 allowed a remote attacker who had compromised the renderer process to perform UI spoofing via a crafted HTML page. (Chromium security severity: Critical)
Published: 2026-05-20
Score: 4.2 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in Google Chrome’s Windows UI implementation allows a remote attacker who has already compromised the renderer process to craft an HTML page that causes the browser to display misleading or malicious user interface elements. The vulnerability can be exploited by delivering specially designed HTML, leading the user to be deceived by spoofed dialog boxes or prompts. The vulnerability is classified as Critical by the Chromium security team.

Affected Systems

Google Chrome running on Windows, specifically all releases prior to version 148.0.7778.179. The issue affects the renderer process utilized by the browser’s UI component.

Risk and Exploitability

The CVSS score of 4.2 indicates a moderate severity, and the vulnerability is not currently listed in the CISA KEV catalog. The EPSS score is not available, indicating no current exploitation data is publicly reported, but the nature of the flaw and its ability to bypass user trust makes it potentially valuable to attackers. Exploitation requires the attacker to have already escalated or compromised the renderer process, typically through another vulnerability or local privilege compromise. When present, a malicious crafted HTML page could trick users into interacting with forged dialogs, facilitating phishing or credential theft. The security impact lies in the potential for deceptive UI manipulation that can lead to further compromise.

Generated by OpenCVE AI on May 20, 2026 at 21:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to version 148.0.7778.179 or later, where the UI rendering bug has been fixed
  • Ensure that renderer processes are sandboxed with minimal privileges to reduce the risk of an attacker compromising them
  • Review and enforce Chrome’s site isolation and security feature settings to limit the impact of any broken renderer process

Generated by OpenCVE AI on May 20, 2026 at 21:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 20 May 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-451
Metrics cvssV3_1

{'score': 4.2, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 May 2026 19:30:00 +0000

Type Values Removed Values Added
Description Inappropriate implementation in UI in Google Chrome on Windows prior to 148.0.7778.179 allowed a remote attacker who had compromised the renderer process to perform UI spoofing via a crafted HTML page. (Chromium security severity: Critical)
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-20T19:43:26.969Z

Reserved: 2026-05-20T17:39:13.752Z

Link: CVE-2026-9110

cve-icon Vulnrichment

Updated: 2026-05-20T19:43:14.525Z

cve-icon NVD

Status : Received

Published: 2026-05-20T20:16:41.683

Modified: 2026-05-20T20:16:41.683

Link: CVE-2026-9110

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T21:30:36Z

Weaknesses