Remote Code Execution Vulnerability in Dawn for Google Chrome
CVE-2026-5281

8.8HIGH

Key Information:

Vendor

Google

Status
Vendor
CVE Published:
1 April 2026

Badges

πŸ₯‡ Trended No. 1πŸ“ˆ TrendedπŸ“ˆ Score: 8,020πŸ‘Ύ Exploit Exists🟑 Public PoCπŸ¦… CISA ReportedπŸ“° News Worthy

What is CVE-2026-5281?

CVE-2026-5281 is a high-severity vulnerability identified in the Dawn rendering engine used by Google Chrome prior to version 146.0.7680.178. This vulnerability arises from a "use after free" condition, which means that memory that has been deallocated is still being accessed, potentially allowing an attacker to execute arbitrary code. The security flaw can be exploited through specially crafted HTML pages, making it critical for organizations that rely on Google Chrome for web browsing and application access. If exploited, this vulnerability can compromise the security of business operations, allowing unauthorized actions, data manipulation, or even complete system takeover through the browser.

Potential impact of CVE-2026-5281

  1. Remote Code Execution: The primary risk associated with CVE-2026-5281 is the potential for remote code execution (RCE). Attackers can execute arbitrary code on compromised systems simply by convincing users to visit a maliciously crafted webpage, leading to severe implications for data integrity and confidentiality.

  2. Compromise of User Data: Since Google Chrome is widely used for accessing sensitive applications and data, successful exploitation of this vulnerability can lead to the theft or manipulation of sensitive information, putting organizations at risk of data breaches and identity theft.

  3. Increased Attack Surface: The existence of this vulnerability may increase the attack surface for organizations, as it could be a stepping stone for more sophisticated attacks, including deploying additional malware or pivoting to internal networks, thereby broadening the impact of the initial compromise.

CISA has reported CVE-2026-5281

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2026-5281 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace

The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

Chrome 146.0.7680.178

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Google issues emergency Chrome update after new zero-day exploit

CVE-2026-5281 actively exploited; CISA urges organisations to patch immediately

4 weeks ago

New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation β€” Patch Released

Chrome patches 21 flaws including exploited CVE-2026-5281 in Dawn, marking fourth zero-day fixed in 2026, reducing active attack risk.

1 month ago

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • πŸ₯‡

    Vulnerability reached the number 1 worldwide trending spot

  • 🟑

    Public PoC available

  • πŸ“°

    First article discovered by The Hacker News

  • πŸ“ˆ

    Vulnerability started trending

  • πŸ‘Ύ

    Exploit known to exist

  • πŸ¦…

    CISA Reported

  • Vulnerability published

  • Vulnerability Reserved

.