CVE-2026-4458Use After Free in Google Chrome

Severity
8.8HIGHNVD
EPSS
0.0%
top 91.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 20

Description

Use after free in Extensions in Google Chrome prior to 146.0.7680.153 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5google/chrome146.0.7680.153146.0.7680.153
NVDgoogle/chrome< 146.0.7680.153
Debianchromium/chromium< 146.0.7680.153-1~deb12u1+2

🔴Vulnerability Details

3
OSV
CVE-2026-4458: Use after free in Extensions in Google Chrome prior to 1462026-03-20
CVEList
CVE-2026-4458: Use after free in Extensions in Google Chrome prior to 1462026-03-20
GHSA
GHSA-fj38-hpf4-jxg7: Use after free in Extensions in Google Chrome prior to 1462026-03-20

📋Vendor Advisories

4
Chrome
Stable Channel Update for Desktop: CVE-2026-44582026-03-18
Red Hat
chromium-browser: Use after free in Extensions2026-03-18
Microsoft
Chromium: CVE-2026-4458 Use after free in Extensions2026-03-10
Debian
CVE-2026-4458: chromium - Use after free in Extensions in Google Chrome prior to 146.0.7680.153 allowed an...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-4458 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-4458 — Use After Free in Google Chrome | cvebase