Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
CloudZ RAT Steals SMS OTPs via Microsoft Phone Abuses Link
May 6, 2026
QLNX Credential Theft Targets Developers for Supply Chain Comprom
May 6, 2026
MajorDoMo RCE Vulnerability Exposes Servers Code Execution
May 6, 2026
Home/CyberSecurity News/Critical Chrome Zero-Day Actively Exploited – Patch
CyberSecurity News

Critical Chrome Zero-Day Actively Exploited – Patch

A critical zero-day vulnerability, actively exploited in the wild, has prompted Google to release an emergency security update for its Chrome browser. The Stable channel has been updated to version...

David kimber
David kimber
April 1, 2026 3 Min Read
2 0

A critical zero-day vulnerability, actively exploited in the wild, has prompted Google to release an emergency security update for its Chrome browser.

The Stable channel has been updated to version 146.0.7680.177/178 for Windows and Mac, and 146.0.7680.177 for Linux, with the rollout expected to reach all users over the coming days and weeks.

The actively exploited vulnerability, tracked as CVE-2026-5281, is a use-after-free vulnerability in Dawn Chrome’s cross-platform GPU abstraction layer used to implement WebGPU.

Use-after-free bugs occur when a program continues to reference freed memory, potentially allowing attackers to execute arbitrary code or escape the browser sandbox.

Google has officially confirmed active exploitation, stating it “is aware that an exploit for CVE-2026-5281 exists in the wild.” The flaw was discovered and reported by an anonymous researcher on March 10, 2026.

Vulnerability details and technical specifics remain restricted until a majority of users have received the patch, a standard practice Google follows to limit exploit replication.

Patch for 21 Security Vulnerabilities

Beyond the zero-day, this update delivers a sweeping set of 21 security fixes, an unusually large batch that signals significant internal security activity. Of those, 19 are rated High severity and span a wide range of Chrome subsystems.

Notable vulnerabilities patched in this release include:

  • CVE-2026-5273 — Use after free in CSS (reported March 18)
  • CVE-2026-5272 — Heap buffer overflow in GPU (reported March 11)
  • CVE-2026-5274 — Integer overflow in Codecs (reported March 1)
  • CVE-2026-5275 — Heap buffer overflow in ANGLE (reported March 4)
  • CVE-2026-5276 — Insufficient policy enforcement in WebUSB (reported March 4)
  • CVE-2026-5278 — Use after free in Web MIDI (reported March 6)
  • CVE-2026-5279 — Object corruption in V8 (reported March 8)
  • CVE-2026-5280 — Use after free in WebCodecs (reported March 11)
  • CVE-2026-5284 — Use after free in Dawn (reported March 12)
  • CVE-2026-5285 — Use after free in WebGL (reported March 13)
  • CVE-2026-5287 — Use after free in PDF (reported March 21)
  • CVE-2026-5288 — Use after free in WebView (reported by Google, March 23)
  • CVE-2026-5289 — Use after free in Navigation (reported by Google, March 25)
  • CVE-2026-5290 — Use after free in Compositing (reported by Google, March 25)

The sheer concentration of use-after-free bugs spanning Dawn, WebGL, WebCodecs, Web MIDI, WebView, Navigation, and Compositing highlights ongoing memory safety challenges in browser rendering pipelines.

Three of the high-severity patches were reported directly by Google’s internal security teams, suggesting some were identified through proactive threat hunting rather than external disclosure.

All Chrome users running versions prior to 146.0.7680.177 on Linux or 146.0.7680.178 on Windows and Mac are potentially exposed. Given the confirmed in-the-wild exploitation of CVE-2026-5281, enterprise users and security teams should treat this update as a critical priority patch.

To update Chrome immediately, navigate to Menu (⋮) → Help → About Google Chrome. The browser will automatically check for and apply the latest update, then prompt a restart to complete the process. Organizations managing Chrome deployments via policy should push the update through their endpoint management platforms without delay.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerabilityzero-day

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Russian Hackers Use CTRL Toolkit for RDP Using Remote

Next Post

HSBC India Mandates All-Uppercase Passwords for Asks Customers

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Prolific Russian Ransomware Member Sentenced to Group Months
May 6, 2026
Detect Phishing-to-RMM Attacks Analysts Trusted-Tool
May 6, 2026
Hackers Exploit Microsoft Teams to Steal Credentials &
May 6, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us