Google Chrome sandbox escape (CVE-2026-7908)
CVE-2026-7908
CVE-2026-7908: Critical use-after-free in Chrome Fullscreen lets attackers escape sandbox via HTML page. Update to Chrome 148.0.7778.96 immediately.
Patch now - CVE-2026-7908 is a critical use-after-free in Google Chrome prior to 148.0.7778.96 that allows a remote attacker to escape the browser’s sandbox and potentially execute code on the host system. The vulnerability is triggered by visiting a crafted HTML page and has been assigned a CVSS score of 9.6.
Overview
CVE-2026-7908 is a use-after-free memory corruption vulnerability in the Fullscreen component of Google Chrome. The flaw exists in how Chrome handles memory when Fullscreen mode is initiated, manipulated, or exited. An attacker who successfully exploits this vulnerability can break out of the browser’s security sandbox, gaining the ability to run arbitrary code on the underlying operating system with the privileges of the Chrome process.
The vulnerability is remotely exploitable over the network with low complexity and requires no authentication. The only prerequisite is user interaction - the victim must open a specially crafted HTML page, typically delivered via a malicious website, email link, or advertisement.
Impact
A successful sandbox escape gives the attacker access to the host system’s file system, processes, and potentially additional privileges depending on the Chrome process’s permissions. On enterprise-managed devices, this could lead to lateral movement, credential theft, or persistent access.
Given the high CVSS score (9.6) and the remote, low-complexity nature of the attack, organizations should treat this vulnerability as urgent. While the Chromium team rated it as “High” severity, the CVSS calculation reflects the reality that a sandbox escape negates most browser-level protections.
Remediation
Google has patched CVE-2026-7908 in Chrome version 148.0.7778.96 and later. Update your browser immediately:
- Windows/Mac/Linux: Chrome will auto-update, but you can force an update via
Settings > About Chrome. Restart the browser after the update completes. - Enterprise users: Deploy the latest Chrome Stable channel update (148.0.7778.96) through your management console.
- Browser-based applications: If your organization relies on Chromium-based frameworks (Electron, CefSharp, etc.), verify they are updated against this CVE.
No workarounds exist apart from updating. Disabling Fullscreen in Group Policy is not sufficient to mitigate the vulnerability.
Security Insight
This vulnerability highlights an ongoing tension in browser security: as sandboxing gets tighter, attackers increasingly target the edges of the sandbox - Fullscreen, permission prompts, and clipboard access. Use-after-free flaws remain one of the most common exploit primitives in modern browsers, suggesting that memory safety in complex C++ codebases like Chrome still has significant gaps. For defenders, this reinforces the importance of treating browser updates as critical patching events rather than optional user-experience improvements.
Related Coverage
- Weekly Threat Roundup: Apache & cPanel Zero-Days (Apr 27 - May 3)
- SAP npm packages compromised in credential-stealing attack
- TeamPCP Supply Chain Campaign: Update 008 - 26-Day Pause Ends with Three Concurrent Attacks
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
Integer overflow in Blink in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)...
Out of bounds read and write in V8 in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Hi...
Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)...
Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Hi...
Other Google Chrome Vulnerabilities
Integer overflow in Blink in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)...
Use after free in Chromoting in Google Chrome on Linux prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code via malicious network traffic. (Chromium security severity: Critical)...
Out of bounds read and write in V8 in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Hi...
Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)...