Skip to main content

CVE-2023-2726: Inappropriate implementation in Google Chrome

High
VulnerabilityCVE-2023-2726cvecve-2023-2726
Published: Tue May 16 2023 (05/16/2023, 18:45:34 UTC)
Source: CVE
Vendor/Project: Google
Product: Chrome

Description

Inappropriate implementation in WebApp Installs in Google Chrome prior to 113.0.5672.126 allowed an attacker who convinced a user to install a malicious web app to bypass install dialog via a crafted HTML page. (Chromium security severity: Medium)

AI-Powered Analysis

AILast updated: 07/03/2025, 12:44:12 UTC

Technical Analysis

CVE-2023-2726 is a high-severity vulnerability affecting Google Chrome versions prior to 113.0.5672.126. The flaw lies in the inappropriate implementation of the WebApp Installs feature, which allows web applications to be installed on a user's device. Specifically, an attacker who convinces a user to visit a crafted HTML page can bypass the usual install dialog prompt that Chrome displays when a web app installation is initiated. This bypass means the malicious web app can be installed without explicit user consent or awareness. The vulnerability is exploitable remotely over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R) in the form of visiting a malicious page. The impact is significant, as the vulnerability affects confidentiality, integrity, and availability (C:H/I:H/A:H). A malicious web app installed silently could execute arbitrary code, steal sensitive data, or disrupt system operations. Although no known exploits are currently reported in the wild, the high CVSS score of 8.8 reflects the potential severity. The vulnerability was publicly disclosed on May 16, 2023, and fixed in Chrome version 113.0.5672.126. This issue underscores the risks associated with web app installation mechanisms and the importance of user consent dialogs in preventing unauthorized software installation.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Google Chrome as a primary web browser. An attacker exploiting this flaw could silently install malicious web applications on employees' devices, potentially leading to data breaches, espionage, ransomware deployment, or disruption of critical business processes. Given the high impact on confidentiality, integrity, and availability, sensitive sectors such as finance, healthcare, government, and critical infrastructure are particularly at risk. The bypass of user consent dialogs increases the likelihood of successful exploitation through social engineering tactics, such as phishing campaigns tailored to European targets. Additionally, compliance with GDPR and other data protection regulations could be jeopardized if personal or sensitive data is exfiltrated via malicious web apps installed through this vulnerability. The lack of known exploits in the wild currently provides a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

European organizations should prioritize updating all Google Chrome installations to version 113.0.5672.126 or later to remediate this vulnerability. Beyond patching, organizations should implement strict browser security policies that restrict or monitor web app installations, especially from untrusted or unknown sources. Deploying endpoint protection solutions capable of detecting unauthorized application installations can help identify exploitation attempts. User awareness training should emphasize the risks of installing web apps from unsolicited or suspicious websites, reinforcing cautious browsing behavior. Network-level controls such as web filtering and URL reputation services can block access to known malicious sites that might host crafted HTML pages exploiting this flaw. Additionally, organizations should audit existing installed web apps for legitimacy and remove any unauthorized or suspicious entries. For high-value targets, consider deploying browser isolation or sandboxing technologies to limit the impact of potential exploitation. Continuous monitoring of threat intelligence feeds for emerging exploits related to CVE-2023-2726 is also recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Chrome
Date Reserved
2023-05-15T21:16:59.067Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc5e2

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/3/2025, 12:44:12 PM

Last updated: 7/25/2025, 12:12:26 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats