CVE-2026-5905: Incorrect security UI in Google Chrome
CVE-2026-5905 is a vulnerability in Google Chrome on Windows versions prior to 147. 0. 7727. 55 where an incorrect security UI in the Permissions interface allows a remote attacker to perform domain spoofing via a crafted HTML page. The issue is classified with medium severity and has a CVSS score of 6. 5. There are no known exploits in the wild. The vendor advisory linked does not explicitly confirm patch availability or remediation status.
AI Analysis
Technical Summary
This vulnerability involves an incorrect security user interface in the Permissions section of Google Chrome on Windows before version 147.0.7727.55. The flaw enables a remote attacker to craft an HTML page that can spoof domains, potentially misleading users about the origin of content or permissions. The CVSS score of 6.5 reflects a medium severity with no confidentiality impact but high integrity impact, requiring user interaction and no privileges. No official remediation level or patch status is confirmed in the provided data, though the vendor advisory link is available for updates.
Potential Impact
The vulnerability allows domain spoofing through the browser's security UI, which can mislead users and potentially facilitate phishing or social engineering attacks. There is no direct confidentiality or availability impact reported. No known exploits are currently active in the wild.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory at https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html for current remediation guidance. Until an official fix is confirmed, users should exercise caution when interacting with permission prompts and avoid clicking on suspicious links or pages that could exploit this UI flaw.
CVE-2026-5905: Incorrect security UI in Google Chrome
Description
CVE-2026-5905 is a vulnerability in Google Chrome on Windows versions prior to 147. 0. 7727. 55 where an incorrect security UI in the Permissions interface allows a remote attacker to perform domain spoofing via a crafted HTML page. The issue is classified with medium severity and has a CVSS score of 6. 5. There are no known exploits in the wild. The vendor advisory linked does not explicitly confirm patch availability or remediation status.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability involves an incorrect security user interface in the Permissions section of Google Chrome on Windows before version 147.0.7727.55. The flaw enables a remote attacker to craft an HTML page that can spoof domains, potentially misleading users about the origin of content or permissions. The CVSS score of 6.5 reflects a medium severity with no confidentiality impact but high integrity impact, requiring user interaction and no privileges. No official remediation level or patch status is confirmed in the provided data, though the vendor advisory link is available for updates.
Potential Impact
The vulnerability allows domain spoofing through the browser's security UI, which can mislead users and potentially facilitate phishing or social engineering attacks. There is no direct confidentiality or availability impact reported. No known exploits are currently active in the wild.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory at https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html for current remediation guidance. Until an official fix is confirmed, users should exercise caution when interacting with permission prompts and avoid clicking on suspicious links or pages that could exploit this UI flaw.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Chrome
- Date Reserved
- 2026-04-08T19:34:44.127Z
- Cvss Version
- null
- State
- PUBLISHED
- Remediation Level
- null
- Vendor Advisory Urls
- [{"url":"https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","vendor":"Google"}]
Threat ID: 69d6ca401cc7ad14dab3cdb4
Added to database: 4/8/2026, 9:36:00 PM
Last enriched: 4/16/2026, 12:17:19 PM
Last updated: 5/23/2026, 5:48:10 PM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.