Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5274: Integer overflow in Google Chrome

0
High
VulnerabilityCVE-2026-5274cvecve-2026-5274
Published: Wed Apr 01 2026 (04/01/2026, 04:41:29 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Integer overflow in Codecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 05:12:46 UTC

Technical Analysis

CVE-2026-5274 is a critical integer overflow vulnerability identified in the Codecs component of Google Chrome prior to version 146.0.7680.178. The vulnerability arises from improper handling of integer values during codec processing, which can lead to an overflow condition. This overflow enables a remote attacker to craft a malicious HTML page that, when loaded by a victim's browser, triggers arbitrary read and write operations in the browser's memory space. Such arbitrary memory manipulation can lead to execution of arbitrary code, potentially allowing full compromise of the browser process. The vulnerability does not require prior authentication but does require the user to visit a maliciously crafted webpage, making social engineering or drive-by download attacks plausible vectors. While no exploits have been observed in the wild yet, the Chromium security team has rated this vulnerability as high severity due to the potential impact on confidentiality, integrity, and availability of user data and browser stability. The lack of a CVSS score means severity must be inferred from the technical details: the ability to perform arbitrary memory operations remotely without authentication is highly dangerous. The vulnerability affects all users running vulnerable Chrome versions, which are widely deployed globally. The patch released in version 146.0.7680.178 addresses the integer overflow by correcting the codec processing logic to properly validate and handle integer values, preventing overflow conditions. Organizations should prioritize updating Chrome to the patched version to mitigate this risk. Additional security controls such as sandboxing, content security policies, and disabling unnecessary codecs can reduce attack surface. Monitoring for suspicious browser behavior and network traffic may help detect exploitation attempts. Given Chrome's dominant market share, this vulnerability poses a significant risk to users worldwide.

Potential Impact

The impact of CVE-2026-5274 is substantial for organizations globally due to the widespread use of Google Chrome as a primary web browser. Successful exploitation allows attackers to perform arbitrary read and write operations in the browser's memory, which can lead to arbitrary code execution. This compromises the confidentiality of sensitive data accessed through the browser, the integrity of browser processes and data, and the availability of the browser itself. Attackers could potentially escalate privileges or use the compromised browser as a foothold to pivot into internal networks. The vulnerability's remote exploitation capability without authentication increases the attack surface, especially in environments where users frequently browse untrusted or malicious websites. Industries with high reliance on web applications, such as finance, healthcare, government, and critical infrastructure, face elevated risks. Additionally, the vulnerability could be leveraged in targeted attacks against high-value individuals or organizations. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency of patching, as threat actors may develop exploits rapidly once the vulnerability is public. Failure to remediate could result in data breaches, operational disruptions, and reputational damage.

Mitigation Recommendations

To mitigate CVE-2026-5274, organizations should immediately update all instances of Google Chrome to version 146.0.7680.178 or later, which contains the official patch addressing the integer overflow. Where immediate patching is not feasible, consider disabling or restricting the use of vulnerable codecs within Chrome if configurable via enterprise policies. Employ browser sandboxing features to limit the impact of potential exploitation. Enforce strict Content Security Policies (CSP) to reduce the risk of malicious script execution from untrusted sources. Utilize endpoint protection solutions capable of detecting anomalous browser behavior indicative of exploitation attempts. Educate users about the risks of visiting untrusted websites and encourage cautious browsing habits to minimize exposure. Monitor network traffic for unusual patterns that may suggest exploitation attempts. Maintain up-to-date threat intelligence feeds to stay informed about any emerging exploits targeting this vulnerability. For high-security environments, consider deploying browser isolation technologies to further reduce risk. Finally, integrate vulnerability management processes to ensure timely application of security patches across all user devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-03-31T20:07:10.977Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cca4c0e6bfc5ba1d99304d

Added to database: 4/1/2026, 4:53:20 AM

Last enriched: 4/1/2026, 5:12:46 AM

Last updated: 4/6/2026, 6:03:46 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses