CVE-2026-5289
Google · Chrome
A use-after-free vulnerability in the Navigation component of Google Chrome allows a remote attacker to perform a sandbox escape via a crafted HTML page.
Executive summary
Google Chrome contains a critical memory corruption vulnerability in its Navigation component that could allow an attacker to bypass security sandboxes and gain unauthorized system access.
Vulnerability
This is a use-after-free vulnerability located in the Navigation logic of the browser. A remote attacker who has successfully compromised the renderer process can exploit this flaw using crafted HTML content to achieve a sandbox escape.
Business impact
With a CVSS score of 9.6, the risk is critical. A sandbox escape is a high-impact event that allows an attacker to execute code outside the browser's restricted process, leading to potential data theft, malware installation, and total system compromise.
Remediation
Immediate Action: Deploy the latest Google Chrome update (146.0.7680.178 or later) across all workstations to patch the underlying memory management flaw.
Proactive Monitoring: Use endpoint detection and response (EDR) tools to identify suspicious child processes spawning from Chrome, which is a common indicator of a sandbox escape.
Compensating Controls: Implement robust web filtering to prevent users from reaching known malicious domains that may host exploit code targeting browser vulnerabilities.
Exploitation status
Public Exploit Available: No
Analyst recommendation
Immediate patching is the only effective defense against this critical vulnerability. IT departments should automate the Chrome update process to ensure all users are protected against this high-severity sandbox escape.