Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2315: Inappropriate implementation in Google Chrome

0
High
VulnerabilityCVE-2026-2315cvecve-2026-2315
Published: Wed Feb 11 2026 (02/11/2026, 18:08:02 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Inappropriate implementation in WebGPU in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:47:52 UTC

Technical Analysis

CVE-2026-2315 is a vulnerability discovered in the WebGPU component of Google Chrome before version 145.0.7632.45. WebGPU is a web standard designed to provide high-performance graphics and computation capabilities within browsers. The vulnerability arises from an inappropriate implementation that allows a remote attacker to cause out-of-bounds memory access by crafting a malicious HTML page that leverages WebGPU features. This memory corruption can lead to arbitrary code execution, data leakage, or browser crashes, impacting confidentiality, integrity, and availability. The attack vector is remote and requires no privileges, but user interaction is necessary since the victim must visit a malicious webpage. The CVSS v3.1 score is 8.8, reflecting high impact across all security properties and ease of exploitation. No public exploits have been reported yet, but the vulnerability is considered critical due to the potential for remote code execution in a widely used browser. Google has released Chrome version 145.0.7632.45 to address this issue, though patch links were not provided in the source data. The vulnerability affects all platforms running the vulnerable Chrome versions, including Windows, macOS, Linux, and potentially mobile platforms supporting WebGPU.

Potential Impact

The impact of CVE-2026-2315 is significant for organizations worldwide as it enables remote attackers to execute arbitrary code or cause denial of service through crafted web content. This can lead to data breaches, unauthorized access to sensitive information, disruption of services, and compromise of user systems. Since Chrome is one of the most widely used browsers globally, the scope of affected systems is vast, spanning enterprise, government, and individual users. Attackers exploiting this vulnerability could bypass sandboxing protections and gain control over the victim's machine, potentially pivoting to internal networks. The requirement for user interaction (visiting a malicious page) means phishing or drive-by download attacks are likely vectors. The vulnerability threatens confidentiality, integrity, and availability, making it a critical risk for organizations relying on Chrome for web access, especially those handling sensitive or regulated data.

Mitigation Recommendations

To mitigate CVE-2026-2315, organizations must prioritize updating Google Chrome to version 145.0.7632.45 or later immediately. Automated patch management systems should be employed to ensure rapid deployment across all endpoints. Network defenses such as web filtering and intrusion prevention systems should be configured to block or flag suspicious WebGPU-related traffic or known malicious URLs. User awareness training should emphasize the risks of visiting untrusted websites and clicking unknown links. For high-security environments, consider disabling WebGPU functionality temporarily if feasible, using browser policies or enterprise management tools. Monitoring browser crash logs and unusual behavior can help detect exploitation attempts. Additionally, employing endpoint detection and response (EDR) solutions can assist in identifying and mitigating post-exploitation activities. Regular vulnerability scanning and threat intelligence updates will help maintain awareness of emerging exploits related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-02-10T21:51:43.156Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698cce794b57a58fa1b3e2a9

Added to database: 2/11/2026, 6:46:17 PM

Last enriched: 2/27/2026, 8:47:52 AM

Last updated: 4/6/2026, 10:32:06 PM

Views: 182

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses