Insufficient Policy Enforcement in Google Chrome
CVE-2026-0628

8.8HIGH

Key Information:

Vendor

Google

Status
Vendor
CVE Published:
6 January 2026

Badges

📈 Trended📈 Score: 1,550👾 Exploit Exists🟡 Public PoC

What is CVE-2026-0628?

CVE-2026-0628 is a high-severity vulnerability that exists within Google Chrome, particularly affecting the WebView tag component in versions prior to 143.0.7499.192. Google Chrome is a widely used web browser, known for its speed, simplicity, and security features. This vulnerability stems from insufficient policy enforcement when handling malicious Chrome extensions. Specifically, an attacker could exploit this weakness by convincing a user to install a crafted extension, allowing them to inject unauthorized scripts or HTML into privileged web pages. Such exploitation could compromise the integrity of web applications and lead to unauthorized actions on behalf of the user, thereby jeopardizing the confidentiality and security of sensitive information.

Potential impact of CVE-2026-0628

  1. Unauthorized Code Execution: By exploiting this vulnerability, attackers could execute arbitrary scripts on trusted web pages, leading to potential data theft, phishing attacks, or further malware installations.

  2. User Data Compromise: The ability to manipulate web content could result in unauthorized access to user data, such as cookies, session tokens, and personal information, which could be leveraged for identity theft or fraud.

  3. Widespread Exploitation Potential: Given the popularity of Google Chrome, the vulnerability could be leveraged in broad campaigns against users. Attackers may use social engineering techniques to lure users into installing malicious extensions, amplifying the risk and impact across various organizations and individuals.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Chrome 143.0.7499.192

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • 📈

    Vulnerability started trending

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.