CVE-2026-0628

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers who convince users to install malicious Chrome extensions to inject scripts or HTML into privileged pages through WebView tags. It affects Google Chrome users running versions before 143.0.7499.192. The attack requires user interaction to install a malicious extension.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 143.0.7499.192
Operating Systems: Windows, macOS, Linux, ChromeOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user to install malicious extension; affects all default Chrome configurations.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of browser session, theft of sensitive data, execution of arbitrary code in privileged context, and potential system compromise through chained attacks.

🟠

Likely Case

Session hijacking, credential theft, data exfiltration from privileged pages, and unauthorized access to sensitive browser data.

🟢

If Mitigated

Limited impact with proper extension vetting and user education; isolated to browser session without system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to install malicious extension; no public exploit code known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 143.0.7499.192 and later

Vendor Advisory: https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop.html

Restart Required: Yes

Instructions:

1. Open Chrome settings 2. Click 'About Chrome' 3. Allow auto-update to 143.0.7499.192+ 4. Restart Chrome when prompted

🔧 Temporary Workarounds

Disable Chrome Extensions

all

Temporarily disable all extensions to prevent exploitation

chrome://extensions/ → Toggle all extensions OFF

Restrict Extension Installation

windows

Configure Chrome policies to block extension installation

Windows: Group Policy Editor → Computer Configuration → Administrative Templates → Google → Google Chrome → Extensions → Configure extension installation block list = *

🧯 If You Can't Patch

  • Implement strict extension whitelisting policies
  • Educate users about risks of installing unknown extensions

🔍 How to Verify

Check if Vulnerable:

Check Chrome version in settings; if below 143.0.7499.192, vulnerable

Check Version:

chrome://version/

Verify Fix Applied:

Confirm Chrome version is 143.0.7499.192 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual extension installation events
  • Multiple WebView tag creation attempts
  • Privileged page access from extensions

Network Indicators:

  • Unexpected connections from Chrome to external domains after extension installation

SIEM Query:

source="chrome_extension_logs" AND (event="extension_install" AND user_interaction="true") OR (event="webview_injection" AND page_type="privileged")

🔗 References

📤 Share & Export