Impact
A use‑after‑free bug in the GPU path of Google Chrome on Windows versions prior to 148.0.7778.179 allows a remote attacker to run arbitrary code inside the browser’s sandbox by delivering a specially crafted HTML page. The flaw is a classic use‑after‑free ( CWE‑416) that can escape the sandbox if triggered, potentially giving the attacker full control over the host system, compromising confidentiality, integrity, and availability.
Affected Systems
Google Chrome running on Windows, any build earlier than 148.0.7778.179, including the 148.0.7778.x series before the 179 release.
Risk and Exploitability
No EPSS score is available, but Chromium labels the issue as high severity with a CVSS score of 8.8, indicating a strong likelihood of exploitation if a suitable trigger is provided. The vulnerability can be triggered remotely via a malicious web page, which means an active or compromised site can act as a vector. The flaw is not listed in CISA’s KEV catalog, and no public exploit has been documented, but the attack surface remains significant given the wide user base of Chrome.
OpenCVE Enrichment
Debian DSA