Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2319: Race in Google Chrome

0
High
VulnerabilityCVE-2026-2319cvecve-2026-2319
Published: Wed Feb 11 2026 (02/11/2026, 18:08:04 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Race in DevTools in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures and install a malicious extension to potentially exploit object corruption via a malicious file. (Chromium security severity: Medium)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:48:10 UTC

Technical Analysis

CVE-2026-2319 is a race condition vulnerability found in the DevTools component of Google Chrome versions prior to 145.0.7632.45. This flaw arises when a remote attacker persuades a user to perform specific UI gestures that lead to the installation of a malicious browser extension. The race condition can cause object corruption within the browser environment, potentially allowing the attacker to execute arbitrary code or manipulate browser behavior. The vulnerability exploits timing issues in the handling of DevTools operations, which are critical for debugging and development tasks. Since the attack vector requires user interaction—specifically, installing a malicious extension—the attacker must convince the user to take these actions, often through social engineering. The CVSS v3.1 base score of 7.5 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with network attack vector, high attack complexity, no privileges required, and user interaction needed. Although no exploits have been reported in the wild, the potential for significant damage exists if exploited, including unauthorized access to sensitive data and control over browser processes. The vulnerability underscores the importance of securing browser extensions and user awareness in preventing exploitation.

Potential Impact

The exploitation of CVE-2026-2319 can have severe consequences for organizations globally. Successful attacks can lead to full compromise of the browser environment, enabling attackers to access sensitive information, manipulate web sessions, and potentially pivot to internal networks. The integrity of data can be undermined by malicious code execution, and availability may be affected if the browser or system becomes unstable or crashes due to object corruption. Given Chrome's widespread use across enterprises, government agencies, and individuals, the vulnerability poses a significant risk to confidentiality and operational continuity. Attackers could leverage this flaw to bypass security controls, steal credentials, or deploy further malware. The requirement for user interaction limits mass exploitation but does not eliminate risk, especially in targeted spear-phishing campaigns or social engineering attacks. Organizations relying heavily on Chrome for daily operations, particularly those in sectors handling sensitive data such as finance, healthcare, and government, face elevated risks.

Mitigation Recommendations

To mitigate CVE-2026-2319, organizations should immediately update Google Chrome to version 145.0.7632.45 or later, where the vulnerability is patched. Beyond patching, implement strict policies on browser extension installation, restricting users from installing extensions from untrusted sources. Employ enterprise browser management tools to whitelist approved extensions and block all others. Educate users about the dangers of installing unsolicited extensions and recognizing social engineering tactics that may prompt risky UI interactions. Monitor browser activity for unusual extension installations or behaviors indicative of exploitation attempts. Additionally, consider deploying endpoint detection and response (EDR) solutions capable of identifying anomalous processes spawned by compromised browsers. Regularly audit and review browser configurations and extension inventories to ensure compliance with security policies. Finally, maintain up-to-date threat intelligence feeds to stay informed about any emerging exploits targeting this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-02-10T21:51:45.389Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698cce7b4b57a58fa1b3e32c

Added to database: 2/11/2026, 6:46:19 PM

Last enriched: 2/27/2026, 8:48:10 AM

Last updated: 3/28/2026, 10:06:20 PM

Views: 174

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses