Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5278: Use after free in Google Chrome

0
High
VulnerabilityCVE-2026-5278cvecve-2026-5278
Published: Wed Apr 01 2026 (04/01/2026, 04:41:31 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Use after free in Web MIDI in Google Chrome on Android prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 05:11:33 UTC

Technical Analysis

CVE-2026-5278 is a use-after-free vulnerability identified in the Web MIDI API implementation within Google Chrome on Android platforms prior to version 146.0.7680.178. Use-after-free vulnerabilities occur when a program continues to use memory after it has been freed, leading to undefined behavior such as memory corruption. In this case, the vulnerability allows a remote attacker to execute arbitrary code on the affected device by delivering a specially crafted HTML page that exploits the flaw in the Web MIDI component. The Web MIDI API enables web applications to interact with MIDI devices, and improper memory management in this feature leads to the use-after-free condition. Exploitation requires the victim to visit a malicious webpage, but no authentication or elevated privileges are needed, increasing the attack surface. Although no public exploits have been reported yet, the Chromium security team has rated this vulnerability as high severity, indicating a significant risk if exploited. The vulnerability affects only Chrome on Android, not desktop or other platforms, and is addressed in Chrome version 146.0.7680.178. The lack of a CVSS score means severity assessment must consider the potential for remote code execution, ease of exploitation, and scope of affected devices.

Potential Impact

The primary impact of CVE-2026-5278 is the potential for remote code execution on Android devices running vulnerable versions of Google Chrome. Successful exploitation could allow attackers to execute arbitrary code with the privileges of the Chrome process, potentially leading to full compromise of the browser environment and possibly the underlying device. This can result in data theft, installation of malware, unauthorized access to sensitive information, and disruption of device functionality. Given the widespread use of Chrome on Android devices globally, the vulnerability poses a significant risk to both individual users and organizations that rely on mobile devices for business operations. The attack vector is remote and requires only user interaction to visit a malicious webpage, making phishing or drive-by download attacks feasible. The vulnerability could be leveraged in targeted attacks against high-value individuals or in mass exploitation campaigns if weaponized. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as details become public.

Mitigation Recommendations

To mitigate CVE-2026-5278, organizations and users should immediately update Google Chrome on Android devices to version 146.0.7680.178 or later, where the vulnerability has been patched. Until updates are applied, users should avoid visiting untrusted or suspicious websites, especially those that may host malicious HTML content exploiting Web MIDI. Disabling the Web MIDI API in Chrome settings or via enterprise policies can reduce the attack surface if the feature is not required. Employing mobile endpoint protection solutions that detect anomalous browser behavior can provide additional defense layers. Network-level protections such as web filtering and DNS filtering can help block access to known malicious sites. Security awareness training emphasizing the risks of clicking unknown links on mobile devices is also recommended. Organizations should monitor threat intelligence feeds for any emerging exploit activity related to this vulnerability and be prepared to respond promptly. Regular patch management and vulnerability scanning on mobile fleets will help ensure timely remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-03-31T20:07:12.284Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cca4c0e6bfc5ba1d99305d

Added to database: 4/1/2026, 4:53:20 AM

Last enriched: 4/1/2026, 5:11:33 AM

Last updated: 4/6/2026, 1:23:12 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses