Skip to content
CVSS 8.3 · HIGH

CVE-2026-7970

Use after free in TopChrome in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)

View on NVD

Analysis

A use-after-free vulnerability in Google Chrome's TopChrome component could allow a sandbox escape if the renderer process is already compromised. While a significant security flaw, this is a routine browser patch that is handled by Google's automatic update mechanism.

Severity

Score: 8.3(HIGH)
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
AV: NETWORK
AC: HIGH
PR: NONE
UI: REQUIRED
S: CHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-416

EPSS

No EPSS score yet (CVE may be too fresh).

Affects

google:chromeapple:macoslinux:linux_kernelmicrosoft:windows

Technical description

Use after free in TopChrome in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)

Published: 5/6/2026, 7:16:47 PM
Last modified: 5/7/2026, 2:01:34 AM

References

HomeEventsBlogResourcesTeam