CVE-2026-5281
ENISA EUVD: EUVD-2026-17795 ↗
Exploited in the Wild
✓ Confirmed 0-Day
★ Google Project Zero
Triaged: April 1, 2026
5 articles
Published: 2026-04-01
EPSS Score
Source: FIRST.org · 2026-05-23
0.5%
probability
This CVE has a 0.5% probability
of being exploited in the next 30 days.
0%
Top 66.3th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)8.8
HIGH
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Description
VulnerabilityLookup (CNA)Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
Affected Products
Google
Chrome
146.0.7680.178
Attack Intelligence
CWE-118
· Incorrect Access of Indexable Resource ('Range Error')
CWE-119
· Buffer Overflow
CWE-416
· Use After Free
CWE-664
· Improper Control of a Resource Through its Lifetime
CWE-666
· Operation on Resource in Wrong Phase of Lifetime
CWE-672
· Operation on a Resource after Expiration or Release
CWE-825
· Expired Pointer Dereference
Google Project Zero
Patched
March 31, 2026
Reported by
86ac1f1587b71893ed2ad792cd7dde32
Exploits & PoC
0
2026-05-22
1 repo — triés par ⭐
Rechercher sur GitHub ↗
Signal Intelligence
Confidence
95%
EPSS
0.5%
CVSS v3.1
8.8
Mentions
5
Last Seen
Apr 14, 2026
CNA Information
CNA Assigner
Chrome
Analyst Note
Auto-confirmed: documented by Google Project Zero (confirmed zero-day by definition).
Triage Info
Decided atApr 01, 2026
Published DateApr 01, 2026