Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4441: Use after free in Google Chrome

0
High
VulnerabilityCVE-2026-4441cvecve-2026-4441
Published: Fri Mar 20 2026 (03/20/2026, 01:34:44 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Use after free in Base in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:23:57 UTC

Technical Analysis

CVE-2026-4441 is a use-after-free vulnerability identified in the Base component of Google Chrome prior to version 146.0.7680.153. Use-after-free bugs occur when a program continues to use memory after it has been freed, leading to undefined behavior such as heap corruption. In this case, a remote attacker can craft a malicious HTML page that triggers this vulnerability when rendered by the browser, causing heap corruption that can be leveraged to execute arbitrary code in the context of the user. The vulnerability requires no privileges and no authentication, but does require user interaction, typically the user visiting a malicious or compromised website. The CVSS 3.1 score of 8.8 reflects the critical nature of this flaw, with high impact on confidentiality, integrity, and availability. The vulnerability affects a widely used browser, increasing the attack surface globally. Although no known exploits have been reported in the wild yet, the potential for exploitation is significant given the ease of triggering the bug via web content. The vulnerability was publicly disclosed on March 20, 2026, and Google has released a patched version (146.0.7680.153) to address the issue. This vulnerability underscores the importance of timely patching and cautious browsing behavior to mitigate risks associated with memory corruption bugs in browsers.

Potential Impact

The impact of CVE-2026-4441 is substantial due to the critical nature of the vulnerability and the widespread use of Google Chrome globally. Successful exploitation can lead to arbitrary code execution, allowing attackers to take control of affected systems, steal sensitive information, manipulate data, or disrupt system availability. Since Chrome is a primary web browser for both consumers and enterprises, this vulnerability poses a risk to a broad range of users including individuals, businesses, and government agencies. The requirement for user interaction (visiting a malicious webpage) means phishing and drive-by download attacks are likely vectors. The vulnerability affects confidentiality by potentially exposing private data, integrity by allowing unauthorized modifications, and availability by causing crashes or denial of service. Organizations with high reliance on Chrome for web access, especially those handling sensitive or critical information, face increased risk of targeted attacks or widespread exploitation if patches are not applied promptly.

Mitigation Recommendations

1. Immediately update Google Chrome to version 146.0.7680.153 or later, which contains the fix for this vulnerability. 2. Employ enterprise patch management solutions to ensure all endpoints receive the update promptly. 3. Educate users about the risks of visiting untrusted or suspicious websites to reduce the likelihood of triggering the exploit. 4. Utilize browser security features such as sandboxing, site isolation, and strict content security policies to limit the impact of potential exploitation. 5. Deploy network-level protections including web filtering and intrusion prevention systems that can detect and block malicious web content. 6. Monitor browser crash logs and unusual behavior that might indicate exploitation attempts. 7. Encourage the use of multi-factor authentication and endpoint detection and response (EDR) tools to mitigate post-exploitation risks. 8. Maintain regular backups and incident response plans to quickly recover from potential compromises.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-03-19T20:23:48.029Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69bcafd6e32a4fbe5f174c36

Added to database: 3/20/2026, 2:24:22 AM

Last enriched: 3/27/2026, 7:23:57 PM

Last updated: 5/4/2026, 3:13:38 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses