[CIVN-2026-0183] Multiple Vulnerabilities in Google Chrome for Desktop

By Published On: April 13, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Google Chrome for Desktop


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


Google Chrome versions prior to 147.0.7727.55/56 for Windows/Mac

Google Chrome versions prior to 147.0.7727.55 for Linux

Overview


Multiple vulnerabilities have been reported in Google Chrome which could allow a remote attacker to execute arbitrary code, bypass security restrictions, obtain sensitive information and cause denial of service (DoS) condition on the targeted system.


Target Audience:

All end-user organizations and individuals using Google Chrome for Desktop.


Risk Assessment:

High risk of remote code execution, memory corruption, and security bypass.


Impact Assessment:

Successful exploitation could lead to system compromise, data theft, or service disruption.


Description


Google Chrome is a popular internet browser that is used for accessing the information available on the world wide web. It is designed for use on desktop computers, such as those running on windows, macOS, or Linux operating system.


Multiple vulnerabilities exist in Google Chrome due to Heap buffer overflow in WebML, WebAudio and ANGLE; Integer overflow in WebML, Skia, Media and WebRTC; Use after free in WebRTC, V8, Media, Blink, PrivateAI and Navigation; Type Confusion in V8 and CSS; Inappropriate implementation in V8, PDF and Navigation; Out of bounds read and write in V8, and Out of bounds read in WebAudio and Blink; Policy bypass in Blink, LocalNetworkAccess, Audio, Downloads, DevTools, IFrameSandbox and ServiceWorkers; Side-channel information leakage in Navigation; Incorrect security UI in Blink, browser UI, Fullscreen, Omnibox, Downloads, History Navigation and Permissions; Insufficient validation of untrusted input in ANGLE, Media, WebML, Downloads and WebSockets; Insufficient policy enforcement in browser UI and PWAs; Race condition in WebCodecs, V8 and Media; Uninitialized use in WebCodecs; Cryptographic flaw in PDFium; and Insufficient data validation in Media. A remote attacker could exploit these vulnerabilities by convincing a victim to open a specially crafted web request.


Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, bypass security restrictions, obtain sensitive information and cause denial of service (DoS) condition on the targeted system.


Solution


Apply appropriate updates as mentioned by the vendor

https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html



Vendor Information


Google Chrome

https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html


References


Google Chrome

https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html


CVE Name

CVE-2026-5858

CVE-2026-5859

CVE-2026-5860

CVE-2026-5861

CVE-2026-5862

CVE-2026-5863

CVE-2026-5864

CVE-2026-5865

CVE-2026-5866

CVE-2026-5867

CVE-2026-5868

CVE-2026-5869

CVE-2026-5870

CVE-2026-5871

CVE-2026-5872

CVE-2026-5873

CVE-2026-5874

CVE-2026-5875

CVE-2026-5876

CVE-2026-5877

CVE-2026-5878

CVE-2026-5879

CVE-2026-5880

CVE-2026-5881

CVE-2026-5882

CVE-2026-5883

CVE-2026-5884

CVE-2026-5885

CVE-2026-5886

CVE-2026-5887

CVE-2026-5888

CVE-2026-5889

CVE-2026-5890

CVE-2026-5891

CVE-2026-5892

CVE-2026-5893

CVE-2026-5894

CVE-2026-5895

CVE-2026-5896

CVE-2026-5897

CVE-2026-5898

CVE-2026-5899

CVE-2026-5900

CVE-2026-5901

CVE-2026-5902

CVE-2026-5903

CVE-2026-5904

CVE-2026-5905

CVE-2026-5906

CVE-2026-5907

CVE-2026-5908

CVE-2026-5909

CVE-2026-5910

CVE-2026-5911

CVE-2026-5912

CVE-2026-5913

CVE-2026-5914

CVE-2026-5915

CVE-2026-5918

CVE-2026-5919




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmnc96UACgkQ3jCgcSdc

ys84Kg/9HS2XbUgjvVskpIC/K1jK9x8ZVOX5/PKXxccnakK23BEjjaCQrVxIc06S

oEhn81fcdJMQH0EUJQjTd4XTg9YU718f1FBbAdUUKffF5agupkEJtL+aGLBdG7rn

6q24jKVZn7RNVpFQ7vVrVkI3LgHjyv0WYRNGPVhNT2ZLChDljyQ/gKauiIoSKMNW

zh5l27AsXISjHiPS+xbk+dgavBmNRaZ6Qqksbm2gJtIOdst55bPw5XTOzlYW3VSP

gly7skuNWHIHpUR9PxllUJUDAvQCDjguVMU9f5qGUg89R3+6aGs7CR+cKvyjzrE+

MZ4nT8b9q+9Kn9vWiPpBBBZJAegZK4xdTqs9d6lykQkWp5XEDVqq1gWtsO1ZMaZO

qZsNd1oPCClinA7eVu8bU5YUSktOekRUTS3Xwz3HvHyjcuwN4TYBQdz9zgutUsTu

UN+OF6tjmad9U0Q2pUh9kDS5SkJ16ZAydp5uMoH/YI9q1W4qmARehKEnIo4VHL5l

qiYt86nTyXFBt+JvCDrHFpeK7z99uT4hyq0gBAeb5mLNKdPH0/OB8AltrZcx84/L

65+ilK4OTEVElsZJ1E9S/iq8I9ltM+lizH8oCdZVF6DagZh2j36XY4ZHb8PDzJhw

4Jm9O61MJEeh61yAoWX6IEZunl3aaocKY0dix4nTtXwYQPAz+4E=

=p+/N

—–END PGP SIGNATURE—–

Share this article