Description
Use after free in XR in Google Chrome on Windows prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
Published: 2026-05-20
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a use‑after‑free bug in the XR (extended reality) component of Google Chrome on Windows. When a crafted HTML page is loaded, the application may dereference freed memory and execute arbitrary code. This flaw allows an attacker who can supply or influence the HTML content to run code with the privilege level of the user browsing the page. The weakness is a classic use‑after‑free (CWE‑416) and is considered a high‑severity security issue.

Affected Systems

Any Windows installation running Google Chrome before version 148.0.7778.179 is vulnerable. The issue was tracked in Chromium issue 498702233 and a stable channel update was released on 2026‑05‑08 to fix the bug. Users of older builds on the stable channel should upgrade to the patched release; other channels (beta, dev, canary) are unaffected or have later patches.

Risk and Exploitability

The CVSS score of 8.8 indicates a high‑severity vulnerability, and the description labels it as high severity, permitting remote code execution. The EPSS score is unavailable, so the likelihood of exploitation is unclear; however, the fact that the vulnerability is triggered by a crafted web page suggests the attacker must make the target browsing a malicious page, which is typically user‑initiated. The flaw is not listed in the CISA KEV catalog, so no public exploit is documented at this time, but the potential for widespread impact remains high.

Generated by OpenCVE AI on May 20, 2026 at 21:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to version 148.0.7778.179 or later on all Windows systems.
  • If an immediate update is not possible, block or disable the XR APIs in Chromium by setting command line switches or applying a policy that restricts XR access for web pages.
  • Monitor Chrome’s release notes and security advisories for any additional mitigations or new patches.

Generated by OpenCVE AI on May 20, 2026 at 21:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 21:00:00 +0000

Type Values Removed Values Added
Title Use‑after‑free in Chrome XR permitting remote code execution

Wed, 20 May 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 20 May 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 20 May 2026 19:30:00 +0000

Type Values Removed Values Added
Description Use after free in XR in Google Chrome on Windows prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-21T03:55:47.527Z

Reserved: 2026-05-20T17:39:23.228Z

Link: CVE-2026-9118

cve-icon Vulnrichment

Updated: 2026-05-20T19:36:37.777Z

cve-icon NVD

Status : Received

Published: 2026-05-20T20:16:43.200

Modified: 2026-05-20T20:16:43.200

Link: CVE-2026-9118

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T21:30:36Z

Weaknesses