Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0907: Incorrect security UI in Google Chrome

0
Critical
VulnerabilityCVE-2026-0907cvecve-2026-0907
Published: Tue Jan 20 2026 (01/20/2026, 04:14:17 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Incorrect security UI in Split View in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)

AI-Powered Analysis

AILast updated: 01/20/2026, 04:36:35 UTC

Technical Analysis

CVE-2026-0907 identifies a security vulnerability in Google Chrome's Split View feature prior to version 144.0.7559.59. The issue arises from incorrect security UI rendering, which enables a remote attacker to perform UI spoofing attacks by delivering specially crafted HTML pages. UI spoofing can mislead users into believing they are interacting with legitimate browser elements or secure sites when they are not, potentially facilitating phishing or social engineering attacks. The vulnerability does not allow direct code execution or system compromise but undermines user trust in browser security indicators. Exploitation requires the victim to visit a malicious webpage, thus involving user interaction but no prior authentication. The Chromium security team has classified this vulnerability as low severity, reflecting its limited technical impact. However, the absence of a CVSS score necessitates an independent severity assessment. The vulnerability affects all Chrome users on versions before 144.0.7559.59, emphasizing the importance of updating to the fixed release. No public exploits or active attacks have been reported, indicating a low immediate threat but a potential vector for targeted phishing campaigns.

Potential Impact

For European organizations, the primary impact of CVE-2026-0907 is the increased risk of successful phishing and social engineering attacks due to deceptive UI elements in Chrome's Split View. This can lead to credential theft, unauthorized access, or data leakage if users are tricked into divulging sensitive information. While the vulnerability does not directly compromise system integrity or availability, the erosion of user trust in browser security indicators can have broader implications for organizational security posture. Sectors relying heavily on secure web interactions, such as financial services, healthcare, and government, may face elevated risks. Additionally, organizations with large remote workforces using Chrome browsers are more exposed. The lack of known active exploitation reduces immediate risk but does not eliminate the potential for future targeted attacks leveraging this vulnerability.

Mitigation Recommendations

To mitigate CVE-2026-0907, European organizations should implement the following specific measures: 1) Ensure all Chrome browsers are updated to version 144.0.7559.59 or later to apply the security fix. 2) Deploy enterprise policies that enforce automatic browser updates and restrict use of outdated versions. 3) Conduct targeted user awareness training focusing on recognizing phishing attempts and suspicious UI elements, especially in multi-window or split view scenarios. 4) Utilize web filtering and URL reputation services to block access to known malicious sites that could exploit UI spoofing. 5) Monitor network traffic and endpoint logs for unusual web activity or repeated access to suspicious HTML content. 6) Encourage the use of multi-factor authentication to reduce the impact of credential theft resulting from phishing. 7) Collaborate with IT and security teams to test and validate browser configurations and extensions that may affect UI rendering. These steps go beyond generic advice by emphasizing organizational controls, user education, and proactive monitoring tailored to this vulnerability's characteristics.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-01-13T18:20:18.301Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696f02a94623b1157c1371db

Added to database: 1/20/2026, 4:20:57 AM

Last enriched: 1/20/2026, 4:36:35 AM

Last updated: 2/6/2026, 2:22:52 PM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats