[CIVN-2026-0051] Remote Code Execution Vulnerability in Google Chrome for Desktop

By Published On: January 28, 2026

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Remote Code Execution Vulnerability in Google Chrome for Desktop 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Google Chrome versions prior to 144.0.7559.109/.110 for Windows/Mac
Google Chrome versions prior to 144.0.7559.109 for Linux
Overview
A vulnerability has been reported in Google Chrome, which could allow a remote attacker to execute arbitrary code on the targeted system.
Target Audience: 
All end-user organisations and individuals using affected Google Chrome for Desktop.
Risk Assessment:
Potential for system compromise and service unavailability.
Impact Assessment:
High risk of system compromise and service disruptions.
Description
Google Chrome is a popular internet browser that is used for accessing the information available on the World Wide Web. It is designed for use on desktop computers, such as those running on windows, macOS, or Linux operating system.
This vulnerability exists in Google Chrome due to Inappropriate implementation in Background Fetch API. A remote attacker could exploit this vulnerability by sending a specially crafted request on the targeted system.
Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor.
https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_27.html
Vendor Information
Google Chrome
https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_27.html
References
Google Chrome
https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_27.html
CVE Name
CVE-2026-1504
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=5U7+
—–END PGP SIGNATURE—–

Share this article