CVE-2026-5290
Google · Chrome
A use-after-free vulnerability in the Compositing component of Google Chrome enables a remote attacker to achieve a sandbox escape through crafted HTML content.
Executive summary
A critical use-after-free flaw in Google Chrome's Compositing engine allows attackers to escape the browser sandbox and potentially execute arbitrary code on the host system.
Vulnerability
This vulnerability involves a use-after-free condition in the browser's Compositing component. An attacker who has already gained control of the renderer process can use a crafted HTML page to trigger this flaw and escape the sandbox.
Business impact
The CVSS score of 9.6 highlights the critical risk posed by this vulnerability. Successful exploitation grants the attacker the ability to interact directly with the operating system, bypassing the browser's primary security layer and endangering all data on the machine.
Remediation
Immediate Action: Force an update of Google Chrome to version 146.0.7680.178 or higher to remediate the Compositing component's memory management issue.
Proactive Monitoring: Monitor for unexpected browser crashes and investigate any instances where the browser process attempts to access sensitive system directories.
Compensating Controls: Enable hardware-enforced security features like DEP and ASLR, which can make the exploitation of use-after-free vulnerabilities significantly more difficult.
Exploitation status
Public Exploit Available: No
Analyst recommendation
Applying the vendor-provided patch is urgent. Organizations should verify that all instances of Google Chrome, including portable or standalone versions, are updated to the secure version immediately.