Critical (9.6)

Google Chrome sandbox escape (CVE-2026-7908)

CVE-2026-7908

CVE-2026-7908: Critical use-after-free in Chrome Fullscreen lets attackers escape sandbox via HTML page. Update to Chrome 148.0.7778.96 immediately.

Affected: Google Chrome Apple Macos Linux Kernel Microsoft Windows

Patch now - CVE-2026-7908 is a critical use-after-free in Google Chrome prior to 148.0.7778.96 that allows a remote attacker to escape the browser’s sandbox and potentially execute code on the host system. The vulnerability is triggered by visiting a crafted HTML page and has been assigned a CVSS score of 9.6.

Overview

CVE-2026-7908 is a use-after-free memory corruption vulnerability in the Fullscreen component of Google Chrome. The flaw exists in how Chrome handles memory when Fullscreen mode is initiated, manipulated, or exited. An attacker who successfully exploits this vulnerability can break out of the browser’s security sandbox, gaining the ability to run arbitrary code on the underlying operating system with the privileges of the Chrome process.

The vulnerability is remotely exploitable over the network with low complexity and requires no authentication. The only prerequisite is user interaction - the victim must open a specially crafted HTML page, typically delivered via a malicious website, email link, or advertisement.

Impact

A successful sandbox escape gives the attacker access to the host system’s file system, processes, and potentially additional privileges depending on the Chrome process’s permissions. On enterprise-managed devices, this could lead to lateral movement, credential theft, or persistent access.

Given the high CVSS score (9.6) and the remote, low-complexity nature of the attack, organizations should treat this vulnerability as urgent. While the Chromium team rated it as “High” severity, the CVSS calculation reflects the reality that a sandbox escape negates most browser-level protections.

Remediation

Google has patched CVE-2026-7908 in Chrome version 148.0.7778.96 and later. Update your browser immediately:

  • Windows/Mac/Linux: Chrome will auto-update, but you can force an update via Settings > About Chrome. Restart the browser after the update completes.
  • Enterprise users: Deploy the latest Chrome Stable channel update (148.0.7778.96) through your management console.
  • Browser-based applications: If your organization relies on Chromium-based frameworks (Electron, CefSharp, etc.), verify they are updated against this CVE.

No workarounds exist apart from updating. Disabling Fullscreen in Group Policy is not sufficient to mitigate the vulnerability.

Security Insight

This vulnerability highlights an ongoing tension in browser security: as sandboxing gets tighter, attackers increasingly target the edges of the sandbox - Fullscreen, permission prompts, and clipboard access. Use-after-free flaws remain one of the most common exploit primitives in modern browsers, suggesting that memory safety in complex C++ codebases like Chrome still has significant gaps. For defenders, this reinforces the importance of treating browser updates as critical patching events rather than optional user-experience improvements.

Further Reading

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other Google Chrome Vulnerabilities

View all Google Chrome vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.