CVE-2026-0901
📋 TL;DR
This vulnerability allows attackers to spoof user interface elements in Chrome on Android, potentially tricking users into interacting with malicious content. It affects Android users running Chrome versions before 144.0.7559.59. The issue stems from improper implementation in Blink, Chrome's rendering engine.
💻 Affected Systems
- Google Chrome
📦 What is this software?
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →⚠️ Risk & Real-World Impact
Worst Case
Attackers could create convincing fake login dialogs, payment screens, or system alerts that trick users into entering sensitive information or performing unintended actions.
Likely Case
Phishing attacks where users are tricked into clicking malicious elements or entering credentials into spoofed UI components.
If Mitigated
Minimal impact if users are trained to recognize phishing attempts and verify URLs before interacting with sensitive UI elements.
🎯 Exploit Status
Exploitation requires user interaction with a crafted HTML page but no authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 144.0.7559.59
Vendor Advisory: https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_13.html
Restart Required: Yes
Instructions:
1. Open Chrome on Android. 2. Go to Settings > About Chrome. 3. Chrome will automatically check for and apply updates. 4. Restart Chrome if prompted.
🔧 Temporary Workarounds
Disable JavaScript
androidPrevents execution of malicious scripts that could exploit the vulnerability.
Settings > Site settings > JavaScript > Block
Use alternative browser
androidSwitch to a different browser until Chrome is updated.
🧯 If You Can't Patch
- Implement web filtering to block access to untrusted websites
- Educate users about phishing risks and UI spoofing techniques
🔍 How to Verify
Check if Vulnerable:
Check Chrome version in Settings > About Chrome. If version is below 144.0.7559.59, the device is vulnerable.
Check Version:
chrome://version/ in Chrome address bar
Verify Fix Applied:
Confirm Chrome version is 144.0.7559.59 or higher in Settings > About Chrome.
📡 Detection & Monitoring
Log Indicators:
- Unusual user reports of suspicious UI elements or unexpected dialog behavior
Network Indicators:
- HTTP requests to known malicious domains hosting crafted HTML pages
SIEM Query:
source="chrome_logs" AND (event="security_alert" OR event="phishing_attempt")