Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3915: Heap buffer overflow in Google Chrome

0
High
VulnerabilityCVE-2026-3915cvecve-2026-3915
Published: Wed Mar 11 2026 (03/11/2026, 22:04:02 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

AILast updated: 03/12/2026, 18:53:33 UTC

Technical Analysis

CVE-2026-3915 is a heap buffer overflow vulnerability found in the WebML component of Google Chrome versions prior to 146.0.7680.71. The flaw arises from improper bounds checking during memory operations, allowing a remote attacker to perform an out-of-bounds memory read by crafting a malicious HTML page that triggers the vulnerability when rendered by the browser. This type of vulnerability can lead to information disclosure, as attackers may read sensitive memory contents, or potentially cause browser crashes or undefined behavior. Exploitation requires the victim to visit a malicious webpage, but no authentication is needed, making it a remote code execution risk vector if combined with other vulnerabilities. Google has classified this vulnerability as high severity, though no CVSS score has been assigned yet. No public exploits are known at this time, but the widespread use of Chrome increases the risk of exploitation attempts. The vulnerability affects a core browser component, WebML, which is used for machine learning tasks within web applications, indicating that any web content leveraging this feature could be weaponized. The issue was publicly disclosed on March 11, 2026, and users are advised to upgrade to Chrome version 146.0.7680.71 or later where the flaw is patched.

Potential Impact

The primary impact of CVE-2026-3915 is the potential for remote attackers to read out-of-bounds memory in the Chrome browser, which can lead to sensitive information disclosure such as user data, browser internals, or other memory-resident secrets. This compromises confidentiality and may also affect integrity if attackers leverage the memory corruption to alter browser behavior or escalate privileges. Additionally, the heap buffer overflow could cause browser crashes, impacting availability and user experience. Organizations relying heavily on Chrome for web access, especially those handling sensitive data or operating in regulated industries, face increased risk of data leakage or targeted attacks. The vulnerability's remote exploitation vector and lack of authentication requirements make it a significant threat for phishing or drive-by download attacks. Although no exploits are currently known in the wild, the high prevalence of Chrome and the ease of triggering the vulnerability via crafted web content mean that attackers may develop exploits rapidly once the vulnerability is public. This could lead to widespread attacks against enterprises, government agencies, and individual users globally.

Mitigation Recommendations

To mitigate CVE-2026-3915, organizations and users should immediately update Google Chrome to version 146.0.7680.71 or later, where the vulnerability is patched. Enterprises should enforce browser update policies and consider deploying centralized update management to ensure all endpoints receive the fix promptly. Network defenses such as web filtering and URL reputation services can help block access to known malicious sites that might exploit this flaw. Security teams should monitor for unusual browser crashes or memory errors that could indicate exploitation attempts. Additionally, disabling or restricting WebML features in Chrome through enterprise policies may reduce the attack surface if immediate patching is not feasible. Employing endpoint detection and response (EDR) solutions to detect anomalous browser behavior and memory corruption attempts can provide early warning. User education on avoiding suspicious links and phishing attempts remains critical. Finally, organizations should maintain layered defenses including network segmentation and least privilege to limit the impact of any successful exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-03-11T05:54:08.358Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b30a512f860ef943dbd428

Added to database: 3/12/2026, 6:47:45 PM

Last enriched: 3/12/2026, 6:53:33 PM

Last updated: 3/14/2026, 3:00:59 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses