Description
Use after free in WebRTC in Google Chrome on Linux prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)
Published: 2026-05-20
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability is a use‑after‑free flaw in the WebRTC component of Google Chrome. When a specially crafted HTML document is displayed in Chrome on Linux, the browser can access memory that has already been freed, allowing the attacker to run arbitrary code within the browser process. The flaw permits full compromise of confidentiality, integrity, and availability for the affected user, granting an attacker the ability to execute any code with the privileges of the browser, potentially leading to system‑wide compromise. It is classified as CWE‑416.

Affected Systems

Google Chrome on Linux versions prior to 148.0.7778.179 are affected. No other vendors or product lines were listed. The flaw is exploitable via a crafted web page loaded in the affected Chrome binaries.

Risk and Exploitability

The CVSS score is 8.8. The EPSS score is not available, but the flaw is marked as critical. It is not listed in the CISA KEV catalog. The attack vector is remote, requiring an attacker to serve a malicious HTML page. No authentication or privileged access is needed beyond a user visiting the page. Once triggered, the use‑after‑free can lead to arbitrary code execution, making the risk and potential impact high for users of the affected Chrome versions.

Generated by OpenCVE AI on May 20, 2026 at 21:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to the latest stable release (≥148.0.7778.179) to receive the fix reported in the official release notes
  • If an update is not immediately possible, disable WebRTC in Chrome’s settings or use a security extension that blocks WebRTC usage to reduce the attack surface
  • Apply network‑level blocking or filtering to prevent access to known malicious domains or to limit the origin of web content that could deliver malicious WebRTC payloads

Generated by OpenCVE AI on May 20, 2026 at 21:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6287-1 chromium security update
History

Thu, 21 May 2026 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Wed, 20 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 20 May 2026 21:00:00 +0000

Type Values Removed Values Added
Title WebRTC Use-After-Free Allows Remote Code Execution on Chrome Linux

Wed, 20 May 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 20 May 2026 19:30:00 +0000

Type Values Removed Values Added
Description Use after free in WebRTC in Google Chrome on Linux prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-21T03:55:44.097Z

Reserved: 2026-05-20T17:39:14.333Z

Link: CVE-2026-9111

cve-icon Vulnrichment

Updated: 2026-05-20T19:43:46.106Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-20T20:16:41.870

Modified: 2026-05-21T16:56:46.883

Link: CVE-2026-9111

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T21:30:36Z

Weaknesses