CVE-2026-5895: Incorrect security UI in Google Chrome
Incorrect security UI in Omnibox in Google Chrome on iOS prior to 147.0.7727.55 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. (Chromium security severity: Low)
AI Analysis
Technical Summary
This vulnerability involves an incorrect security UI rendering in the Omnibox of Google Chrome on iOS, allowing a remote attacker to spoof the URL bar contents via a crafted domain name. The flaw affects versions prior to 147.0.7727.55. The Chromium security team rates the severity as low. No CVSS score or detailed exploitation information is provided. The vendor advisory linked references a stable channel update, implying a fix is included in version 147.0.7727.55.
Potential Impact
The impact is limited to potential user deception through spoofing of the URL bar, which could facilitate phishing or social engineering attacks by making malicious sites appear legitimate. There is no indication of direct code execution or data compromise. The severity is considered low by the vendor.
Mitigation Recommendations
Users should update Google Chrome on iOS to version 147.0.7727.55 or later to remediate this vulnerability. The vendor advisory suggests that this update includes the fix. No additional mitigation steps are specified or required.
CVE-2026-5895: Incorrect security UI in Google Chrome
Description
Incorrect security UI in Omnibox in Google Chrome on iOS prior to 147.0.7727.55 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. (Chromium security severity: Low)
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability involves an incorrect security UI rendering in the Omnibox of Google Chrome on iOS, allowing a remote attacker to spoof the URL bar contents via a crafted domain name. The flaw affects versions prior to 147.0.7727.55. The Chromium security team rates the severity as low. No CVSS score or detailed exploitation information is provided. The vendor advisory linked references a stable channel update, implying a fix is included in version 147.0.7727.55.
Potential Impact
The impact is limited to potential user deception through spoofing of the URL bar, which could facilitate phishing or social engineering attacks by making malicious sites appear legitimate. There is no indication of direct code execution or data compromise. The severity is considered low by the vendor.
Mitigation Recommendations
Users should update Google Chrome on iOS to version 147.0.7727.55 or later to remediate this vulnerability. The vendor advisory suggests that this update includes the fix. No additional mitigation steps are specified or required.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Chrome
- Date Reserved
- 2026-04-08T19:34:41.346Z
- Cvss Version
- null
- State
- PUBLISHED
- Remediation Level
- null
- Vendor Advisory Urls
- [{"url":"https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","vendor":"Google"}]
Threat ID: 69d6ca3e1cc7ad14dab3cd66
Added to database: 4/8/2026, 9:35:58 PM
Last enriched: 4/8/2026, 9:52:57 PM
Last updated: 4/9/2026, 7:29:12 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.