Chrome Vulnerability (CVE-2026-3539)
CVE-2026-3539
Attacker exploits CVE-2026-3539 heap corruption in Chrome DevTools to execute arbitrary code. Requires malicious extension. Update to Chrome 145.0.7632.159+.
Vendor-confirmed - CVE-2026-3539 is a high heap corruption vulnerability in Google Chrome (before 145.0.7632.159) that grants arbitrary code execution when a user installs a malicious extension. Update to the patched version immediately.
Overview
A high-severity vulnerability has been identified in Google Chrome’s Developer Tools (DevTools). This flaw involves an object lifecycle management error, which could allow a malicious actor to corrupt the browser’s memory (heap corruption) under specific conditions.
Vulnerability Explained Simply
Think of the browser’s memory as a carefully organized workspace. Chrome’s DevTools feature helps developers manage objects (pieces of data and code) in this space, ensuring they are created and deleted properly. This vulnerability is a bug in that cleanup process. If a user installs a specially crafted malicious browser extension, it could trick DevTools into improperly handling these objects. This mistake corrupts the organized memory workspace, potentially allowing the attacker to take control of that part of the browser.
Potential Impact
If successfully exploited, this heap corruption could enable an attacker to execute arbitrary code on the victim’s machine within the context of the Chrome browser. In practice, this means an attacker could:
- Steal sensitive data (passwords, cookies, session tokens) from the browser.
- Install malware or other unwanted software on the system.
- Perform actions on behalf of the logged-in user.
Crucial Note: Exploitation requires the user to be tricked into installing a malicious extension from the Chrome Web Store or another source. The attack cannot be triggered by simply visiting a website.
Remediation and Mitigation
The primary solution is to update the browser immediately.
1. Immediate Action: Update Chrome Google has released a fix in version 145.0.7632.159 and later. To update:
- Click the three vertical dots in Chrome’s top-right corner.
- Navigate to Help > About Google Chrome.
- The browser will automatically check for and install the update. A restart is required.
2. Enterprise Management For IT administrators managing deployments via Google Chrome Enterprise or policies:
- Ensure your update channels are pushing version 145.0.7632.159 or higher.
- Consider temporarily increasing update priority for this release due to its high severity.
3. Important Mitigation Advice
- Extension Vigilance: Reinforce policies and user training regarding browser extensions. Users should only install extensions from trusted publishers on the official Chrome Web Store. Review and audit installed extensions, especially those with broad permissions.
- Principle of Least Privilege: Maintain standard user accounts for daily work, not administrative accounts, to limit the potential impact of any successful exploit.
All users and organizations should apply the update as soon as possible to eliminate this risk.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. Prior to version 0.7.7, a Server-Side Request Forgery (SSRF) vulnerability in the /download endpoint all...
The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.8.6 via the ...
OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets shar...
Balbooa Joomla Forms Builder 2.0.6 contains an unauthenticated SQL injection vulnerability in the form submission handler that allows remote attackers to execute arbitrary SQL queries. Attackers can s...
Other Google Vulnerabilities
OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets shar...
The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.8.6 via the ...