Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0628: Insufficient policy enforcement in Google Chrome

0
High
VulnerabilityCVE-2026-0628cvecve-2026-0628
Published: Tue Jan 06 2026 (01/06/2026, 23:57:00 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

CVE-2026-0628 is a high-severity vulnerability in Google Chrome versions prior to 143. 0. 7499. 192 involving insufficient policy enforcement in the WebView tag. An attacker who convinces a user to install a malicious Chrome extension can exploit this flaw to inject scripts or HTML into privileged pages, potentially compromising confidentiality, integrity, and availability. The vulnerability requires no privileges and no authentication but does require user interaction to install the malicious extension. This flaw stems from improper enforcement of security policies (CWE-862) within the WebView component. Although no known exploits are currently in the wild, the high CVSS score of 8. 8 reflects the significant risk posed by this vulnerability. Organizations worldwide using affected Chrome versions should prioritize patching and implement strict extension installation policies to mitigate risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/17/2026, 18:12:54 UTC

Technical Analysis

CVE-2026-0628 is a vulnerability identified in Google Chrome prior to version 143.0.7499.192, specifically related to insufficient policy enforcement in the WebView tag. The WebView tag is a component that allows embedding web content within Chrome extensions or applications. Due to inadequate enforcement of security policies, a malicious Chrome extension can inject arbitrary scripts or HTML into privileged pages, which normally have elevated privileges and access to sensitive browser or system resources. This injection capability arises because the extension can bypass intended restrictions on content execution within these privileged contexts. The vulnerability is classified under CWE-862, indicating a failure to enforce security policies properly. Exploitation requires an attacker to convince a user to install a crafted malicious extension, which then leverages this flaw to escalate privileges within the browser environment. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with an attack vector of network, low attack complexity, no privileges required, but user interaction needed. Although no active exploits have been reported, the potential for significant damage exists, including data theft, session hijacking, or browser compromise. The lack of a patch link suggests that users should upgrade to version 143.0.7499.192 or later once available. This vulnerability highlights the critical need for strict extension vetting and policy enforcement within browser ecosystems.

Potential Impact

The impact of CVE-2026-0628 is substantial for organizations globally. Successful exploitation allows attackers to inject malicious code into privileged browser pages, potentially leading to full compromise of browser security boundaries. This can result in unauthorized access to sensitive data, credential theft, session hijacking, and manipulation of browser behavior. The compromise of privileged pages can also facilitate further attacks on internal networks or escalate to system-level compromise if combined with other vulnerabilities. Since Chrome is widely used in enterprise and consumer environments, the scope of affected systems is vast. The requirement for user interaction (installing a malicious extension) means social engineering is a key attack vector, increasing risk in environments with less stringent user awareness or controls. The vulnerability threatens confidentiality, integrity, and availability of data accessed via the browser, which is often a primary interface for cloud services, internal applications, and web-based tools. Organizations relying heavily on Chrome for daily operations, especially those in finance, healthcare, government, and critical infrastructure, face elevated risks of data breaches and operational disruption.

Mitigation Recommendations

To mitigate CVE-2026-0628, organizations should: 1) Immediately update Google Chrome to version 143.0.7499.192 or later once the patch is officially released to ensure the vulnerability is addressed. 2) Enforce strict policies on Chrome extension installation by limiting installations to those from trusted sources or enterprise-approved extension stores. 3) Implement application whitelisting and use Chrome's enterprise management tools to control extension permissions and prevent unauthorized installations. 4) Educate users about the risks of installing untrusted extensions and employ phishing-resistant user awareness training to reduce the likelihood of social engineering attacks. 5) Monitor browser activity and logs for unusual extension behavior or injection attempts, leveraging endpoint detection and response (EDR) tools with browser monitoring capabilities. 6) Consider deploying browser isolation or sandboxing technologies to limit the impact of potential browser-based compromises. 7) Regularly audit and review installed extensions across the organization to detect and remove any unauthorized or suspicious extensions. These steps go beyond generic patching advice by focusing on proactive policy enforcement, user education, and monitoring to reduce attack surface and detect exploitation attempts early.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-01-05T23:32:30.339Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695da30cee4c93a4aaa68c92

Added to database: 1/7/2026, 12:04:28 AM

Last enriched: 3/17/2026, 6:12:54 PM

Last updated: 3/24/2026, 4:41:36 PM

Views: 1855

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses