Google Chrome CVE-2026-6302: Overview of a High Severity Use After Free in the Video Component

A brief summary of CVE-2026-6302, a use after free vulnerability in Google Chrome's Video component that enables remote code execution inside the browser sandbox via a crafted HTML page.

CVE Analysis

5 min read

ZeroPath CVE Analysis
ZeroPath CVE Analysis

2026-04-15

Google Chrome CVE-2026-6302: Overview of a High Severity Use After Free in the Video Component
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

A use after free vulnerability in Google Chrome's Video component gives remote attackers a path to arbitrary code execution inside the browser sandbox, requiring nothing more than a victim clicking a link to a crafted HTML page. With Chrome running on roughly two thirds of all browsers worldwide, CVE-2026-6302 and its CVSS 3.1 score of 8.8 represent a meaningful risk surface for virtually every organization.

Technical Information

The root cause of CVE-2026-6302 is a use after free condition (CWE-416) in Chrome's Video component. A use after free occurs when application code dereferences a pointer to memory that has already been freed and potentially reallocated for a different purpose. In the context of a browser, this class of bug is particularly dangerous because the attacker can influence heap layout through JavaScript and DOM manipulation, increasing the likelihood that freed memory is reclaimed with attacker controlled data.

The CVSS 3.1 vector breaks down as follows:

MetricValueDescription
Base Score8.8High severity
Attack VectorNetworkExploitable over the internet
Attack ComplexityLowNo specialized access conditions required
Privileges RequiredNoneAttacker needs no prior authentication
User InteractionRequiredVictim must visit a crafted HTML page
ScopeUnchangedRemains within the vulnerable component
Confidentiality ImpactHighTotal loss of information within context
Integrity ImpactHighTotal compromise of data integrity
Availability ImpactHighComplete denial of service within context

Attack Flow

From an exploitation perspective, the attack would proceed as follows:

  1. The attacker constructs a malicious HTML page that triggers specific Video component behavior in Chrome, causing a memory object to be freed prematurely.
  2. The attacker uses heap shaping techniques (commonly via JavaScript typed arrays or other allocator friendly objects) to reclaim the freed memory with controlled content.
  3. When Chrome's Video component subsequently accesses the dangling pointer, it operates on attacker controlled data, enabling arbitrary code execution.
  4. The victim is lured to the attacker controlled page through phishing, malvertising, or embedding the payload in an iframe on a compromised site.
  5. Code execution occurs within the Chrome renderer sandbox. While the sandbox constrains the blast radius, the attacker achieves full control within that context, with high impact to confidentiality, integrity, and availability.

The vulnerability was reported by the security researcher Syn4pse on March 24, 2026. Google has restricted access to the specific bug details and related links until a majority of users have received the update, which is standard practice to limit the window for reverse engineering and exploit development.

Affected Systems and Versions

All Google Chrome versions prior to 147.0.7727.101 are affected. The fixed versions by operating system are:

Operating SystemMinimum Secure Version
Windows147.0.7727.101 or 147.0.7727.102
Mac147.0.7727.101 or 147.0.7727.102
Linux147.0.7727.101

Any Chromium based browser that incorporates the vulnerable Video component code may also be affected, though specific version mappings for downstream browsers (Edge, Brave, Opera, etc.) will depend on their respective update schedules.

Vendor Security History

Google Chrome's security track record reflects both the scale of its attack surface and the maturity of its defensive investments. The Chromium project employs AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, and AFL to proactively detect memory corruption issues. The Vulnerability Rewards Program incentivizes external researchers to report bugs responsibly.

Despite these measures, Chrome remains a high value target. The April 15, 2026 stable channel update that addressed CVE-2026-6302 included 31 distinct security fixes. More critically, March 2026 saw confirmed in the wild exploitation of at least two other Chrome vulnerabilities:

Vulnerability IDComponentReported DateIn the Wild Exploitation
CVE-2026-6302VideoMarch 24, 2026None reported currently
CVE-2026-5281DawnMarch 31, 2026Confirmed by Google
CVE-2026-3910UnknownMarch 10, 2026Confirmed by Google

This pattern of rapid weaponization of Chrome memory corruption flaws reinforces the importance of treating CVE-2026-6302 as a high priority remediation item, even in the absence of confirmed exploitation.

References

Detect & fix
what others miss

Security magnifying glass visualization