CVE-2026-5289Use After Free in Google Chrome

CWE-416Use After Free11 documents10 sources
Severity
9.6CRITICALNVD
EPSS
0.1%
top 79.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 1
Latest updateApr 15

Description

Use after free in Navigation in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:HExploitability: 2.8 | Impact: 6.0

Affected Packages3 packages

CVEListV5google/chrome146.0.7680.178146.0.7680.178
NVDgoogle/chrome< 146.0.7680.177
Debianchromium/chromium< 146.0.7680.177-1~deb12u1+2

🔴Vulnerability Details

4
VulDB
Google Chrome up to 146.0.7680.165 Navigation use after free (ID 495931 / EUVD-2026-17807)2026-04-15
OSV
CVE-2026-5289: Use after free in Navigation in Google Chrome prior to 1462026-04-01
GHSA
GHSA-jggq-q9cp-hf4g: Use after free in Navigation in Google Chrome prior to 1462026-04-01
CVEList
CVE-2026-5289: Use after free in Navigation in Google Chrome prior to 1462026-04-01

📋Vendor Advisories

3
Microsoft
Chromium: CVE-2026-5289 Use after free in Navigation2026-04-02
Chrome
Stable Channel Update for Desktop: CVE-2026-52872026-03-31
Debian
CVE-2026-5289: chromium - Use after free in Navigation in Google Chrome prior to 146.0.7680.178 allowed a ...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-5289 Impact, Exploitability, and Mitigation Steps | Wiz

💬Community

2
Bugzilla
CVE-2026-5289 chromium: Google Chrome/Chromium: Sandbox escape via use-after-free in Navigation [epel-all]2026-04-01
Bugzilla
CVE-2026-5289 chromium: Google Chrome/Chromium: Sandbox escape via use-after-free in Navigation [fedora-all]2026-04-01
CVE-2026-5289 — Use After Free in Google Chrome | cvebase