CVE-2026-5889: Cryptographic Flaw in Google Chrome
Cryptographic Flaw in PDFium in Google Chrome prior to 147.0.7727.55 allowed an attacker to read potentially sensitive information from encrypted PDFs via a brute-force attack. (Chromium security severity: Medium)
AI Analysis
Technical Summary
CVE-2026-5889 describes a cryptographic vulnerability in the PDFium component of Google Chrome before version 147.0.7727.55. The flaw enables an attacker to potentially extract sensitive data from encrypted PDF documents through brute-force methods. The vulnerability affects desktop versions of Chrome and was publicly disclosed on April 8, 2026. Google released an update to Chrome 147.0.7727.55 that addresses this issue. No CVSS score is available, and no exploits have been reported in the wild.
Potential Impact
An attacker exploiting this vulnerability could gain unauthorized access to sensitive information contained within encrypted PDF files viewed in vulnerable versions of Chrome. This could lead to information disclosure. However, the attack requires brute-force techniques, which may limit the practicality and speed of exploitation. There are no reports of active exploitation in the wild.
Mitigation Recommendations
Users should update Google Chrome to version 147.0.7727.55 or later to remediate this vulnerability. The vendor advisory confirms that the issue is fixed in this version. No additional mitigation steps are indicated or required according to the vendor advisory.
CVE-2026-5889: Cryptographic Flaw in Google Chrome
Description
Cryptographic Flaw in PDFium in Google Chrome prior to 147.0.7727.55 allowed an attacker to read potentially sensitive information from encrypted PDFs via a brute-force attack. (Chromium security severity: Medium)
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-5889 describes a cryptographic vulnerability in the PDFium component of Google Chrome before version 147.0.7727.55. The flaw enables an attacker to potentially extract sensitive data from encrypted PDF documents through brute-force methods. The vulnerability affects desktop versions of Chrome and was publicly disclosed on April 8, 2026. Google released an update to Chrome 147.0.7727.55 that addresses this issue. No CVSS score is available, and no exploits have been reported in the wild.
Potential Impact
An attacker exploiting this vulnerability could gain unauthorized access to sensitive information contained within encrypted PDF files viewed in vulnerable versions of Chrome. This could lead to information disclosure. However, the attack requires brute-force techniques, which may limit the practicality and speed of exploitation. There are no reports of active exploitation in the wild.
Mitigation Recommendations
Users should update Google Chrome to version 147.0.7727.55 or later to remediate this vulnerability. The vendor advisory confirms that the issue is fixed in this version. No additional mitigation steps are indicated or required according to the vendor advisory.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Chrome
- Date Reserved
- 2026-04-08T19:34:39.903Z
- Cvss Version
- null
- State
- PUBLISHED
- Remediation Level
- null
- Vendor Advisory Urls
- [{"url":"https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","vendor":"Google"}]
Threat ID: 69d6ca3e1cc7ad14dab3cd4e
Added to database: 4/8/2026, 9:35:58 PM
Last enriched: 4/8/2026, 10:06:55 PM
Last updated: 4/9/2026, 8:01:02 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.