CVE-2026-5892: Insufficient policy enforcement in Google Chrome
Insufficient policy enforcement in PWAs in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to install a PWA without user consent via a crafted HTML page. (Chromium security severity: Medium)
AI Analysis
Technical Summary
This vulnerability in Google Chrome's PWA policy enforcement allows an attacker with control over the renderer process to bypass user consent mechanisms and install PWAs silently via crafted HTML content. It affects Chrome versions prior to 147.0.7727.55. The vulnerability does not have a CVSS score but is rated medium severity by Chromium security. The vendor advisory linked corresponds to a stable channel update that presumably includes the fix.
Potential Impact
An attacker who has compromised the renderer process can install PWAs without user consent, potentially leading to unauthorized software installation and persistence on the affected system. This could facilitate further attacks or user deception. There are no known exploits in the wild at this time.
Mitigation Recommendations
Upgrade Google Chrome to version 147.0.7727.55 or later, as this version addresses the insufficient policy enforcement vulnerability. Since this is a client-side application, users and administrators should ensure timely updates to mitigate the risk. Patch status is inferred from the affected version and vendor advisory; check the official Chrome release notes for confirmation.
CVE-2026-5892: Insufficient policy enforcement in Google Chrome
Description
Insufficient policy enforcement in PWAs in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to install a PWA without user consent via a crafted HTML page. (Chromium security severity: Medium)
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability in Google Chrome's PWA policy enforcement allows an attacker with control over the renderer process to bypass user consent mechanisms and install PWAs silently via crafted HTML content. It affects Chrome versions prior to 147.0.7727.55. The vulnerability does not have a CVSS score but is rated medium severity by Chromium security. The vendor advisory linked corresponds to a stable channel update that presumably includes the fix.
Potential Impact
An attacker who has compromised the renderer process can install PWAs without user consent, potentially leading to unauthorized software installation and persistence on the affected system. This could facilitate further attacks or user deception. There are no known exploits in the wild at this time.
Mitigation Recommendations
Upgrade Google Chrome to version 147.0.7727.55 or later, as this version addresses the insufficient policy enforcement vulnerability. Since this is a client-side application, users and administrators should ensure timely updates to mitigate the risk. Patch status is inferred from the affected version and vendor advisory; check the official Chrome release notes for confirmation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Chrome
- Date Reserved
- 2026-04-08T19:34:40.655Z
- Cvss Version
- null
- State
- PUBLISHED
- Remediation Level
- null
- Vendor Advisory Urls
- [{"url":"https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","vendor":"Google"}]
Threat ID: 69d6ca3e1cc7ad14dab3cd5a
Added to database: 4/8/2026, 9:35:58 PM
Last enriched: 4/8/2026, 10:06:35 PM
Last updated: 4/9/2026, 8:14:28 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.