CVE-2026-7360: Insufficient validation of untrusted input in Google Chrome
CVE-2026-7360 is a vulnerability in Google Chrome prior to version 147. 0. 7727. 138 involving insufficient validation of untrusted input in the compositing component. This flaw could allow a remote attacker who has already compromised the renderer process to bypass site isolation by using a crafted HTML page. The vulnerability is classified with high severity by Chromium security. There is no CVSS score provided, and no explicit patch or remediation level is confirmed in the available data. The vendor advisory link is provided but does not explicitly confirm patch status in the input data.
AI Analysis
Technical Summary
This vulnerability arises from insufficient validation of untrusted input within the compositing subsystem of Google Chrome before version 147.0.7727.138. An attacker with control over the renderer process could exploit this flaw to bypass site isolation protections through a specially crafted HTML page. Site isolation is a critical security feature designed to prevent cross-site data leaks by isolating different sites into separate processes. The vulnerability is recognized as high severity by Chromium security but lacks a CVSS score and explicit remediation details in the provided information.
Potential Impact
If exploited, this vulnerability could allow an attacker who has already compromised the renderer process to bypass site isolation, potentially leading to unauthorized access to data from other sites or processes. This undermines a key security boundary in Chrome, increasing the risk of data leakage or further compromise within the browser environment. There are no known exploits in the wild as per the provided data.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory at https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_28.html for current remediation guidance. Until official fixes are confirmed, users should update to the latest Chrome version once available and follow any vendor instructions. No specific temporary mitigations are provided in the available data.
CVE-2026-7360: Insufficient validation of untrusted input in Google Chrome
Description
CVE-2026-7360 is a vulnerability in Google Chrome prior to version 147. 0. 7727. 138 involving insufficient validation of untrusted input in the compositing component. This flaw could allow a remote attacker who has already compromised the renderer process to bypass site isolation by using a crafted HTML page. The vulnerability is classified with high severity by Chromium security. There is no CVSS score provided, and no explicit patch or remediation level is confirmed in the available data. The vendor advisory link is provided but does not explicitly confirm patch status in the input data.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability arises from insufficient validation of untrusted input within the compositing subsystem of Google Chrome before version 147.0.7727.138. An attacker with control over the renderer process could exploit this flaw to bypass site isolation protections through a specially crafted HTML page. Site isolation is a critical security feature designed to prevent cross-site data leaks by isolating different sites into separate processes. The vulnerability is recognized as high severity by Chromium security but lacks a CVSS score and explicit remediation details in the provided information.
Potential Impact
If exploited, this vulnerability could allow an attacker who has already compromised the renderer process to bypass site isolation, potentially leading to unauthorized access to data from other sites or processes. This undermines a key security boundary in Chrome, increasing the risk of data leakage or further compromise within the browser environment. There are no known exploits in the wild as per the provided data.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory at https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_28.html for current remediation guidance. Until official fixes are confirmed, users should update to the latest Chrome version once available and follow any vendor instructions. No specific temporary mitigations are provided in the available data.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Chrome
- Date Reserved
- 2026-04-28T20:02:48.922Z
- Cvss Version
- null
- State
- PUBLISHED
- Remediation Level
- null
- Vendor Advisory Urls
- [{"url":"https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_28.html","vendor":"Google"}]
Threat ID: 69f13d76cbff5d8610e355e7
Added to database: 4/28/2026, 11:06:30 PM
Last enriched: 4/28/2026, 11:21:29 PM
Last updated: 4/29/2026, 12:07:47 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.