Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5279: Object corruption in Google Chrome

0
High
VulnerabilityCVE-2026-5279cvecve-2026-5279
Published: Wed Apr 01 2026 (04/01/2026, 04:41:31 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Object corruption in V8 in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 05:11:21 UTC

Technical Analysis

CVE-2026-5279 is a vulnerability identified in the V8 JavaScript engine component of Google Chrome, specifically affecting versions prior to 146.0.7680.178. The issue arises from object corruption within V8, which can be triggered by a specially crafted HTML page. This corruption enables a remote attacker to execute arbitrary code inside the sandbox environment of the browser. The sandbox is designed to isolate browser processes and limit the impact of exploits; however, successful code execution here can lead to further exploitation or data compromise within the user's environment. The vulnerability does not require prior authentication but does require the victim to visit a malicious webpage, implying user interaction is necessary. Although no public exploits have been reported, the Chromium security team has classified this vulnerability as high severity due to the potential for remote code execution. The lack of a CVSS score means severity assessment must consider the impact on confidentiality, integrity, and availability, the ease of exploitation, and the scope of affected systems. Given Chrome's dominant market share globally, this vulnerability represents a significant risk vector for users and organizations relying on Chrome for web access. The vulnerability was publicly disclosed on April 1, 2026, with a patch available in version 146.0.7680.178, though no direct patch links were provided in the source data.

Potential Impact

The impact of CVE-2026-5279 is substantial for organizations worldwide due to the widespread use of Google Chrome as a primary web browser. Successful exploitation could allow attackers to execute arbitrary code within the browser sandbox, potentially leading to data theft, installation of malware, or further lateral movement within a network if sandbox escapes are chained. Confidentiality is at risk as attackers may access sensitive information processed or displayed in the browser. Integrity can be compromised if attackers alter web content or browser behavior. Availability could be affected if malicious code disrupts browser operations or system stability. The requirement for user interaction (visiting a malicious webpage) limits automated exploitation but does not significantly reduce risk given common user browsing behavior. Organizations with high reliance on web applications, especially those handling sensitive data or critical infrastructure, face elevated risks. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity rating underscores the urgency of patching. Additionally, threat actors may develop exploits rapidly following disclosure, increasing the threat landscape.

Mitigation Recommendations

To mitigate CVE-2026-5279, organizations should immediately update all instances of Google Chrome to version 146.0.7680.178 or later, where the vulnerability is patched. Automated patch management systems should be employed to ensure rapid deployment across all endpoints. Beyond patching, organizations should implement browser security best practices such as disabling or restricting JavaScript execution on untrusted sites using browser extensions or policies, enabling sandboxing and site isolation features, and employing web filtering to block access to known malicious domains. User awareness training should emphasize the risks of visiting untrusted websites and clicking on suspicious links. Network-level protections like intrusion detection/prevention systems (IDS/IPS) can help detect and block exploit attempts. Monitoring browser crash logs and unusual behavior can provide early indicators of exploitation attempts. For high-risk environments, consider using hardened browsers or virtualized browsing environments to further isolate potential threats. Regularly reviewing and updating security policies related to web browsing is also recommended.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-03-31T20:07:12.562Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cca4c0e6bfc5ba1d993061

Added to database: 4/1/2026, 4:53:20 AM

Last enriched: 4/1/2026, 5:11:21 AM

Last updated: 4/5/2026, 11:09:37 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses