Brief Summary: Google Chrome XR Use After Free Vulnerability CVE-2026-6358

A short review of CVE-2026-6358, a critical use after free vulnerability in Google Chrome's XR component on Android that enables out of bounds memory reads via crafted HTML pages.

CVE Analysis

5 min read

ZeroPath CVE Analysis
ZeroPath CVE Analysis

2026-04-15

Brief Summary: Google Chrome XR Use After Free Vulnerability CVE-2026-6358
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

A critical use after free vulnerability in Google Chrome's XR component on Android allows remote attackers to perform out of bounds memory reads simply by getting a user to visit a crafted HTML page. Given Chrome's dominant position with roughly 69 to 79 percent of the global browser market, the potential attack surface for CVE-2026-6358 is substantial, and organizations with unmanaged Android fleets face particular exposure.

Technical Information

CVE-2026-6358 is classified under CWE-416 (Use After Free). The vulnerability resides in the XR component of Google Chrome on Android. XR refers to the subsystem responsible for handling WebXR and related immersive experience APIs within the browser.

A use after free condition occurs when a program continues to reference a memory location after that memory has been deallocated. In this case, the freed memory within the XR component can be read out of bounds by a remote attacker. The National Vulnerability Database reports a CVSS 3.1 base score of 8.8 (High), assigned by CISA ADP. The full vector string is AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, which breaks down as follows:

  • Network accessible: No physical or local access required
  • Low attack complexity: No special conditions or race conditions needed
  • No privileges required: The attacker does not need an account or elevated access
  • User interaction required: The victim must navigate to the malicious page
  • Scope unchanged: The vulnerability affects only the vulnerable component
  • High impact across confidentiality, integrity, and availability

Chromium's own internal severity assessment rated this vulnerability as Critical.

Attack Flow

Based on available information, exploitation proceeds as follows:

  1. The attacker crafts a malicious HTML page designed to trigger the use after free condition in Chrome's XR subsystem.
  2. The victim is lured to visit the page, for example through phishing, a malicious advertisement, or a compromised website.
  3. When Chrome's XR component processes the crafted content, it accesses memory that has already been freed.
  4. This results in an out of bounds memory read, which could allow the attacker to leak sensitive data from the browser's memory space.
  5. Given the CVSS impact ratings of High across all three impact categories, further exploitation beyond a simple memory read (such as achieving code execution) may be possible, though specific exploitation chains have not been publicly documented.

The Chromium issue tracker entry (issue 497724498) remains access restricted, and no proof of concept code or detailed exploitation mechanics have been published. Security teams should rely on version based detection rather than network signatures to identify vulnerable installations.

Affected Systems and Versions

The vulnerability specifically affects Google Chrome on Android prior to version 147.0.7727.101. However, the simultaneous release of patches across platforms means the following versions should be considered the minimum safe versions:

Operating SystemMinimum Safe Chrome Version
Android147.0.7727.101
Windows147.0.7727.101 / 147.0.7727.102
macOS147.0.7727.101 / 147.0.7727.102
Linux147.0.7727.101

Any Chrome installation on Android running a version older than 147.0.7727.101 is vulnerable to this specific CVE. Organizations should audit their managed device inventories and enforce the minimum version through MDM or enterprise browser management platforms.

Vendor Security History

Google maintains a mature security program around Chrome and the broader Chromium project. The Chrome Vulnerability Reward Program actively incentivizes responsible disclosure, and Google regularly publishes security updates with transparency through its Chrome Releases blog and Google Security Blog.

That said, Chrome remains a frequent target. In March 2026, Google issued an emergency update to address two zero day vulnerabilities that were confirmed to be under active exploitation. This pattern of recurring critical and zero day vulnerabilities reflects the reality of maintaining the world's most widely used browser rather than a deficiency in Google's security practices. The restricted status of the Chromium bug tracker entry for CVE-2026-6358 is consistent with Google's standard practice of limiting vulnerability details until a majority of users have updated.

References

Detect & fix
what others miss

Security magnifying glass visualization