Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2319: Race in Google Chrome

0
High
VulnerabilityCVE-2026-2319cvecve-2026-2319
Published: Wed Feb 11 2026 (02/11/2026, 18:08:04 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Race in DevTools in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures and install a malicious extension to potentially exploit object corruption via a malicious file. (Chromium security severity: Medium)

AI-Powered Analysis

AILast updated: 02/11/2026, 19:01:33 UTC

Technical Analysis

CVE-2026-2319 is a race condition vulnerability identified in the DevTools component of Google Chrome versions prior to 145.0.7632.45. The flaw arises from improper handling of concurrent operations within DevTools, which can be exploited by a remote attacker who persuades a user to perform specific user interface gestures and install a malicious browser extension. This sequence can trigger object corruption via a malicious file, potentially allowing the attacker to execute unauthorized actions or compromise the browser's integrity. The attack vector requires active user participation, including interaction with the UI and installation of a malicious extension, which limits the ease of exploitation. Although no public exploits have been reported, the vulnerability poses a risk to users who might be socially engineered into performing these steps. The absence of a CVSS score suggests the vulnerability was recently disclosed and awaiting formal scoring. The Chromium security team has rated this vulnerability as medium severity, reflecting moderate impact and exploitation complexity. The vulnerability affects all Chrome users running versions before 145.0.7632.45, emphasizing the importance of timely updates. Given Chrome's widespread use in enterprise and development environments, especially within Europe, this vulnerability could be leveraged to compromise sensitive browser sessions or developer tools if exploited.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized code execution or browser compromise if an attacker successfully convinces an employee to install a malicious extension via crafted UI interactions. This could result in data leakage, session hijacking, or manipulation of web applications accessed through the browser. Organizations with developers or IT staff using Chrome DevTools are particularly at risk, as the vulnerability resides in this component. The impact on confidentiality and integrity is moderate, as exploitation requires user interaction and extension installation, but once exploited, it could facilitate further attacks or data exfiltration. Availability impact is limited but could occur if the browser becomes unstable due to object corruption. The threat is heightened in sectors with high reliance on Chrome for sensitive operations, such as finance, government, and technology companies across Europe. Although no known exploits exist yet, the vulnerability's presence in a widely used browser component necessitates proactive mitigation to prevent potential targeted attacks.

Mitigation Recommendations

European organizations should immediately update all Chrome installations to version 145.0.7632.45 or later to remediate this vulnerability. Implement strict policies to control extension installations, such as whitelisting approved extensions and disabling user ability to install extensions from untrusted sources. Educate users, especially developers and IT personnel, about the risks of installing extensions prompted by unsolicited requests or suspicious UI prompts. Employ endpoint protection solutions that monitor and block unauthorized extension installations or suspicious browser behaviors. Regularly audit browser configurations and installed extensions to detect anomalies. Consider deploying browser isolation technologies for high-risk users to reduce exposure. Monitor security advisories from Google and Chromium for any updates or patches related to this vulnerability. Finally, integrate this vulnerability into organizational risk assessments and incident response plans to ensure readiness in case of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-02-10T21:51:45.389Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698cce7b4b57a58fa1b3e32c

Added to database: 2/11/2026, 6:46:19 PM

Last enriched: 2/11/2026, 7:01:33 PM

Last updated: 2/11/2026, 8:20:01 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats