Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4458: Use after free in Google Chrome

0
High
VulnerabilityCVE-2026-4458cvecve-2026-4458
Published: Fri Mar 20 2026 (03/20/2026, 01:34:55 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Use after free in Extensions in Google Chrome prior to 146.0.7680.153 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:28:01 UTC

Technical Analysis

CVE-2026-4458 is a use-after-free vulnerability identified in the Extensions component of Google Chrome versions prior to 146.0.7680.153. This vulnerability arises when the browser improperly manages memory related to extensions, allowing a maliciously crafted Chrome extension to exploit heap corruption. The attack vector involves social engineering, where an attacker convinces a user to install a malicious extension. Once installed, the extension can trigger the use-after-free condition, leading to potential arbitrary code execution within the browser context. This can result in full compromise of the browser process, enabling attackers to steal sensitive data, manipulate browser behavior, or disrupt availability. The vulnerability has a CVSS v3.1 base score of 8.8, indicating high severity, with attack vector being network, no privileges required, but user interaction necessary. No public exploits have been reported yet, but the flaw’s nature and impact make it a critical concern. The vulnerability affects all platforms running the vulnerable Chrome versions, including Windows, macOS, Linux, and Chrome OS. Google has addressed this issue in Chrome version 146.0.7680.153, and users are strongly advised to update. The lack of known exploits in the wild suggests a window for proactive patching before widespread exploitation occurs.

Potential Impact

The exploitation of CVE-2026-4458 can have severe consequences for organizations globally. Successful attacks can lead to arbitrary code execution within the browser, allowing attackers to bypass security controls, steal credentials, access sensitive information, or deploy further malware. Given Chrome’s widespread use as the primary web browser in enterprises, government agencies, and critical infrastructure sectors, this vulnerability poses a significant risk to confidentiality, integrity, and availability. Attackers leveraging this flaw could gain footholds in corporate networks, conduct espionage, or disrupt operations. The requirement for user interaction (installing a malicious extension) means social engineering campaigns could be effective, especially in targeted phishing or spear-phishing attacks. The vulnerability’s presence across multiple operating systems increases the attack surface. Without timely patching, organizations remain exposed to potentially impactful breaches and operational disruptions.

Mitigation Recommendations

1. Immediately update all instances of Google Chrome to version 146.0.7680.153 or later, where the vulnerability is patched. 2. Implement strict extension policies via enterprise management tools to restrict installation of extensions only from trusted sources or pre-approved lists. 3. Educate users about the risks of installing unverified or suspicious browser extensions and train them to recognize social engineering attempts. 4. Employ browser security features such as sandboxing and site isolation to limit the impact of potential exploitation. 5. Monitor network traffic and endpoint behavior for unusual activities indicative of exploitation attempts, such as unexpected extension installations or anomalous browser process behavior. 6. Use endpoint detection and response (EDR) solutions to detect and respond to exploitation attempts quickly. 7. Regularly review and audit installed extensions across the organization to ensure compliance with security policies. 8. Consider deploying application allowlisting to prevent unauthorized software, including malicious extensions, from running.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-03-19T20:23:53.653Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69bcafd9e32a4fbe5f174ce3

Added to database: 3/20/2026, 2:24:25 AM

Last enriched: 3/27/2026, 7:28:01 PM

Last updated: 5/1/2026, 9:06:31 AM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses