CVE-2026-5288
Google · Chrome (Android WebView)
A use-after-free vulnerability in Google Chrome's Android WebView allows remote attackers to execute a sandbox escape via crafted HTML content.
Executive summary
Google Chrome on Android is susceptible to a critical sandbox escape vulnerability due to a use-after-free error in the WebView component, potentially allowing full device compromise.
Vulnerability
The flaw is a use-after-free condition within the WebView component. A remote attacker who has already compromised the renderer process can use a specifically crafted HTML page to trigger this memory corruption and escape the application sandbox.
Business impact
This vulnerability carries a CVSS score of 9.6, reflecting its extreme severity. A successful sandbox escape allows an attacker to move beyond the browser's restricted environment, potentially gaining access to sensitive mobile data, system resources, and other installed applications.
Remediation
Immediate Action: Update Google Chrome on Android devices to version 146.0.7680.178 or higher immediately via the Google Play Store.
Proactive Monitoring: Security teams should monitor for unusual application crashes on Android endpoints that may indicate failed exploitation attempts of memory corruption flaws.
Compensating Controls: Utilize Mobile Device Management (MDM) solutions to enforce browser updates and restrict access to untrusted websites on corporate-managed Android devices.
Exploitation status
Public Exploit Available: No
Analyst recommendation
This vulnerability represents a significant threat to mobile security and data privacy. Organizations must ensure that all Android-based endpoints are updated to the latest version of Chrome to mitigate the risk of a remote sandbox escape.