๐ŸŸข CVE-2026-5281

CVE-2026-5281 is a use-after-free vulnerability in Google Chrome's Dawn component that allows arbitrary code execution via crafted HTML pages. While actively exploited in the wild, this affects client-side browser software, not internet-facing servers, making it a phishing/social engineering attack vector rather than direct internet exploitation.

โ† Back to Overview
LOW_RISK
Risk Level
T1566
MITRE Technique
8.8
CVSS Score
NETWORK
Attack Vector
VERY_LOW
Deployment Risk
No
Ransomware

๐Ÿ“‹ Vulnerability Details

Data Source: CIRCL

Confidence: HIGH

Exploitation Method: USER_INTERACTION

CVE Published: 2026-04-01

Added to CISA KEV: 2026-04-01 0 DAY BETWEEN CVE AND KEV

๐ŸŽฏ Recommendations:

๐Ÿ” Web Intelligence

Key Sources:

  • NVD - CVE-2026-5281

    CVE-2026-5281 Detail. Description. Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page.Quick Info. CVE Dictionary Entry: CVE-2026-5281 NVD Published Date: 04/01/2026 NVD Last Modified: 04/01/2026 Source: Chrome.

  • Google fixes fourth Chrome zero-day exploited in attacks in 2026

    Google is aware that an exploit for CVE-2026-5281 exists in the wild," Google said in a security advisory issued on Tuesday. ... exploiting this zero-day flaw in the wild, it did not share ... Google patched two other Chrome zero-day bugs exploited in attacks earlier this month: the first is an out-of-bounds write weakness in the Skia 2D graphics library (CVE-2026-3909), and the second is an inappropriate implementation vulnerability in the V8 JavaScript and WebAssembly engine (CVE-2026-3910).

  • New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation โ€” Patch ...

    The high-severity vulnerability, CVE-2026-5281 (CVSS score: N/A), concerns a use-after-free bug in Dawn, an open-source and cross-platform implementation of the WebGPU standard.As is customary for these alerts, Google did not provide any further details on how the shortcoming is being exploited and who may be behind the effort. This is typically done so as to ensure that a majority of users are updated with a fix and prevent other actors from joining the exploitation bandwagon.

  • Google Addresses Zero-day Vulnerability Exploited in the Wild (CVE-2026 ...

    CVE-2026-5281 is a use-after-free vulnerability in Dawn, the open-source implementation of the WebGPU standard. This type of memory corruption flaw occurs when an application continues to use a pointer after the memory it points to has been cleared.

  • Google fixes Chrome zero-day with in-the-wild exploit (CVE-2026-5281)

    About CVE-2026-5281. As per usual, information about the fixed zero-day is limited, and thereโ€™s no details about the exploit (or how/if itโ€™s being used by attackers). CVE-2026-5281โ€™s official description says itโ€™s a use-after-free (UAF) vulnerability in Dawn, an open-source and cross-platform implementation of the WebGPU standard thatโ€™s used in Chromium and Chromium-based browsers. The vulnerability affects Chrome versions before v146.0.7680.177/178 for Windows/Mac, and before v146.0.7680.177 for Linux.