Use after free in PrivateAI in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
Metrics
Affected Vendors & Products
References
History
Mon, 13 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apple
Apple macos Linux Linux linux Kernel Microsoft Microsoft windows |
|
| CPEs | cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Apple
Apple macos Linux Linux linux Kernel Microsoft Microsoft windows |
Sat, 11 Apr 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Use‑after‑free in Chrome PrivateAI Allows Sandbox Escape | Google Chrome: Chromium: Google Chrome: Sandbox escape via use-after-free in PrivateAI |
| Weaknesses | CWE-825 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 09 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Use‑after‑free in Chrome PrivateAI Allows Sandbox Escape | |
| First Time appeared |
Google
Google chrome |
|
| Vendors & Products |
Google
Google chrome |
Wed, 08 Apr 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Use after free in PrivateAI in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium) | |
| Weaknesses | CWE-416 | |
| References |
|
Status: PUBLISHED
Assigner: Chrome
Published: 2026-04-08T21:20:46.077Z
Updated: 2026-04-11T02:59:10.879Z
Reserved: 2026-04-08T19:34:36.131Z
Link: CVE-2026-5874
Updated: 2026-04-11T02:59:04.201Z
Status : Analyzed
Published: 2026-04-08T22:16:27.003
Modified: 2026-04-13T17:57:38.287
Link: CVE-2026-5874