CVE-2026-0906
Google · Google Chrome on Android
A critical vulnerability, identified as CVE-2026-0906, exists in Google Chrome on Android, carrying a CVSS score of 9.8.
Executive summary
A critical vulnerability, identified as CVE-2026-0906, exists in Google Chrome on Android, carrying a CVSS score of 9.8. This flaw allows a remote attacker to spoof the URL displayed in the address bar, potentially tricking users into believing they are on a legitimate website when they are actually interacting with a malicious one. Successful exploitation could lead to sophisticated phishing attacks, credential theft, or malware distribution.
Vulnerability
The vulnerability is categorized as an "Incorrect security UI" issue. A remote attacker can craft a specific HTML page that, when visited by a user on an affected version of Chrome for Android, manipulates the browser's user interface. This manipulation causes the Omnibox (URL bar) to display a false or misleading URL, effectively spoofing the identity of the website. This deceives the user about the origin of the content, making it a powerful tool for phishing and social engineering attacks.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Exploitation could have a significant business impact by enabling highly convincing phishing campaigns against employees. If an attacker spoofs a trusted internal or external website (e.g., a login portal for email, banking, or corporate applications), they could steal employee credentials, leading to unauthorized access to sensitive corporate data, financial systems, and other critical resources. This could result in data breaches, financial loss, and reputational damage.
Remediation
Immediate Action: Update Google Chrome on Android to version 144.0.7559.59 or a later version immediately on all corporate and BYOD devices. Centrally manage and enforce browser updates through Mobile Device Management (MDM) solutions where possible. Monitor for exploitation attempts and review access logs for unusual authentication patterns that might indicate compromised credentials.
Proactive Monitoring: Monitor network traffic for connections to suspicious or newly registered domains. Utilize endpoint security solutions to detect and block malicious payloads that might be delivered through phishing sites. Security teams should be alert to an increase in user-reported phishing emails or suspicious websites.
Compensating Controls: If immediate patching is not feasible, implement compensating controls. Enhance user awareness training to educate employees on identifying phishing attempts and the importance of verifying URLs. Employ web filtering and DNS protection services to block access to known malicious websites. Ensure multi-factor authentication (MFA) is enforced on all critical applications to mitigate the impact of stolen credentials.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the critical CVSS score of 9.8, we recommend that organizations treat this vulnerability with high urgency. The potential for highly effective phishing attacks poses a direct risk to organizational security. All instances of Google Chrome on Android should be patched immediately. While this CVE is not currently listed on the CISA KEV list, its high severity rating warrants immediate attention and remediation to prevent potential future exploitation.