High (8.8)

Chrome sandbox escape via video code execution (CVE-2026-6302)

CVE-2026-6302

Use after free in Video in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)...

Overview

A high-severity vulnerability, tracked as CVE-2026-6302, has been patched in Google Chrome. This flaw is a use-after-free bug within the browser’s video processing component. If successfully exploited, it could allow an attacker to break out of Chrome’s security sandbox and execute arbitrary code on a victim’s system.

Vulnerability Details

The vulnerability exists in versions of Google Chrome prior to 147.0.7727.101. It is classified as a use-after-free error, a type of memory corruption flaw that occurs when a program continues to use a pointer to a memory location after it has been freed. In this case, the error is within the code responsible for handling video content.

An attacker can trigger this flaw by crafting a malicious HTML page. When a user visits this page, the vulnerability can be exploited to execute code within the browser’s renderer process sandbox. The sandbox is a critical security boundary designed to contain such exploits; breaking it significantly elevates the risk.

Impact and Attack Vector

This vulnerability has a CVSS score of 8.8 (High). The attack vector is network-based, requiring no special privileges. However, successful exploitation does require user interaction-specifically, a user must be tricked into visiting a malicious website.

The primary risk is remote code execution. By escaping the sandbox, an attacker could potentially install malware, steal sensitive data, or create a persistent backdoor on the compromised system. While there is no current evidence of active exploitation in the wild, the high severity and potential impact make it a significant threat.

Remediation and Mitigation

The immediate and primary action is to update Google Chrome. All users and administrators must ensure their browsers are updated to version 147.0.7727.101 or later.

Action Steps:

  1. Update Chrome: Open Chrome, click the three-dot menu (⋮) in the top-right corner, navigate to Help > About Google Chrome. The browser will automatically check for and install the update. A restart is required to complete the process.
  2. Enterprise Deployment: IT administrators should push the updated browser package (147.0.7727.101+) to all managed endpoints using their standard deployment tools.
  3. Verify Version: Confirm the installed version is 147.0.7727.101 or higher by checking the “About Google Chrome” page.

As a general security practice, users should exercise caution with unsolicited links and ensure other browser components and operating systems are also kept up to date.

Security Insight

CVE-2026-6302 highlights the persistent threat of memory corruption vulnerabilities in complex, high-performance components like video codecs. These components are attractive targets because they process untrusted, often malformed, data from the web. This incident follows a pattern seen in other high-profile browser exploits, such as those previously fixed by Google, underscoring the continuous arms race between browser security teams and attackers seeking to dismantle sandbox protections.

Further Reading

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.