Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3936: Use after free in Google Chrome

0
High
VulnerabilityCVE-2026-3936cvecve-2026-3936
Published: Wed Mar 11 2026 (03/11/2026, 22:04:14 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

CVE-2026-3936 is a high-severity use-after-free vulnerability in the WebView component of Google Chrome on Android versions prior to 146. 0. 7680. 71. This flaw allows a remote attacker to exploit heap corruption by crafting a malicious HTML page, potentially leading to full compromise of confidentiality, integrity, and availability. Exploitation requires user interaction, such as visiting a malicious webpage, but no privileges or prior authentication are needed. Although no known exploits are currently reported in the wild, the vulnerability's high CVSS score of 8. 8 reflects its critical impact. Organizations relying on Android devices with vulnerable Chrome versions are at risk of remote code execution and data breaches. Immediate patching to version 146.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 02:50:34 UTC

Technical Analysis

CVE-2026-3936 is a use-after-free vulnerability identified in the WebView component of Google Chrome on Android platforms prior to version 146.0.7680.71. Use-after-free bugs occur when a program continues to use memory after it has been freed, leading to undefined behavior such as heap corruption. In this case, a remote attacker can craft a malicious HTML page that, when loaded by the vulnerable WebView, triggers the use-after-free condition. This can corrupt the heap memory, potentially allowing the attacker to execute arbitrary code, escalate privileges, or cause a denial of service. The vulnerability requires no prior authentication and can be exploited remotely over the network, but does require user interaction, such as visiting a malicious or compromised website. The CVSS v3.1 base score of 8.8 indicates a high severity, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no exploits have been reported in the wild yet, the nature of the vulnerability and its presence in a widely used component like WebView makes it a significant risk. The vulnerability affects Android devices running Chrome versions before 146.0.7680.71, which is a common browser and WebView provider on Android devices. The lack of patch links in the provided data suggests that users should update to the fixed version as soon as it becomes available or is confirmed. The vulnerability is particularly critical because WebView is used by many Android applications to render web content, expanding the attack surface beyond just the Chrome browser itself.

Potential Impact

The impact of CVE-2026-3936 is substantial for organizations and individuals using Android devices with vulnerable Chrome WebView versions. Successful exploitation can lead to remote code execution, allowing attackers to gain control over the affected device. This can result in data theft, installation of persistent malware, espionage, or disruption of services. The compromise of confidentiality, integrity, and availability can affect sensitive corporate data, user credentials, and critical applications relying on WebView for rendering content. Enterprises with mobile workforces or BYOD policies are particularly at risk, as attackers can target employees through phishing or malicious websites. The widespread use of Android globally means a large attack surface, and the requirement for only user interaction (visiting a malicious page) lowers the barrier for exploitation. Although no known exploits are currently in the wild, the high severity and ease of exploitation make this a critical vulnerability to address promptly to prevent potential future attacks.

Mitigation Recommendations

1. Immediate update: Organizations and users should update Google Chrome on Android devices to version 146.0.7680.71 or later as soon as possible to apply the patch fixing this vulnerability. 2. Application whitelisting: Limit the use of WebView-based applications to trusted sources and restrict installation of unverified apps that might expose WebView to malicious content. 3. Network controls: Implement web filtering and URL reputation services to block access to known malicious or suspicious websites that could host exploit pages. 4. User awareness: Educate users about the risks of clicking unknown links or visiting untrusted websites, especially on mobile devices. 5. Monitor logs: Enable and monitor security logs for unusual WebView activity or crashes that could indicate exploitation attempts. 6. Employ sandboxing: Use Android security features and app sandboxing to limit the impact of any successful exploitation. 7. Incident response readiness: Prepare to respond quickly to any signs of compromise related to WebView or Chrome on Android devices, including isolating affected devices and performing forensic analysis. 8. Vendor communication: Stay updated with Google’s security advisories for any additional patches or mitigations related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-03-11T05:54:14.400Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b2df702f860ef943b15ceb

Added to database: 3/12/2026, 3:44:48 PM

Last enriched: 3/20/2026, 2:50:34 AM

Last updated: 4/26/2026, 9:23:43 PM

Views: 214

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses