CVE-2026-5289

Google · Chrome

A use-after-free vulnerability in the Navigation component of Google Chrome allows a remote attacker to perform a sandbox escape via a crafted HTML page.

Executive summary

Google Chrome contains a critical memory corruption vulnerability in its Navigation component that could allow an attacker to bypass security sandboxes and gain unauthorized system access.

Vulnerability

This is a use-after-free vulnerability located in the Navigation logic of the browser. A remote attacker who has successfully compromised the renderer process can exploit this flaw using crafted HTML content to achieve a sandbox escape.

Business impact

With a CVSS score of 9.6, the risk is critical. A sandbox escape is a high-impact event that allows an attacker to execute code outside the browser's restricted process, leading to potential data theft, malware installation, and total system compromise.

Remediation

Immediate Action: Deploy the latest Google Chrome update (146.0.7680.178 or later) across all workstations to patch the underlying memory management flaw.

Proactive Monitoring: Use endpoint detection and response (EDR) tools to identify suspicious child processes spawning from Chrome, which is a common indicator of a sandbox escape.

Compensating Controls: Implement robust web filtering to prevent users from reaching known malicious domains that may host exploit code targeting browser vulnerabilities.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Immediate patching is the only effective defense against this critical vulnerability. IT departments should automate the Chrome update process to ensure all users are protected against this high-severity sandbox escape.