CVE-2026-2320

6.5 MEDIUM

📋 TL;DR

This vulnerability in Google Chrome allows attackers to trick users into interacting with fake UI elements by convincing them to perform specific gestures on a malicious webpage. It affects Chrome users on all platforms who haven't updated to version 145.0.7632.45 or later. The attack requires user interaction but can lead to unintended actions being performed.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 145.0.7632.45
Operating Systems: Windows, macOS, Linux, ChromeOS, Android
Default Config Vulnerable: ⚠️ Yes
Notes: All default Chrome configurations are vulnerable. Chromium-based browsers like Microsoft Edge, Brave, etc. may also be affected if they haven't incorporated the Chromium fix.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could create convincing fake file upload dialogs or other UI elements that trick users into uploading sensitive files, granting permissions, or performing actions they didn't intend.

🟠

Likely Case

Attackers use this to create convincing phishing pages that trick users into uploading files or performing actions they believe are legitimate, potentially leading to data exfiltration or account compromise.

🟢

If Mitigated

With proper user education and updated browsers, the impact is minimal as users are less likely to interact with suspicious UI elements and the vulnerability is patched.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction with specific UI gestures on a crafted webpage. No authentication is required to serve the malicious page, but user interaction is needed for successful exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 145.0.7632.45 and later

Vendor Advisory: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html

Restart Required: No

Instructions:

1. Open Chrome and click the three-dot menu
2. Go to Help > About Google Chrome
3. Chrome will automatically check for updates and install if available
4. Relaunch Chrome if prompted

🔧 Temporary Workarounds

Disable automatic file downloads

all

Configure Chrome to ask where to save files instead of automatically downloading

chrome://settings/content/automaticDownloads

Enable enhanced security features

all

Turn on Enhanced Safe Browsing for additional protection against malicious sites

chrome://settings/security

🧯 If You Can't Patch

  • Implement web filtering to block known malicious sites and suspicious domains
  • Educate users about phishing risks and not to interact with unexpected file upload prompts

🔍 How to Verify

Check if Vulnerable:

Check Chrome version by navigating to chrome://settings/help or clicking Help > About Google Chrome

Check Version:

chrome://version

Verify Fix Applied:

Verify Chrome version is 145.0.7632.45 or higher

📡 Detection & Monitoring

Log Indicators:

  • Multiple file upload attempts from same user in short timeframe
  • Unusual file types being uploaded via browser

Network Indicators:

  • Connections to domains hosting suspicious HTML pages with file input elements
  • Unusual outbound file transfers following web browsing

SIEM Query:

source="chrome_audit_log" AND (event="file_upload" OR event="permission_grant") AND user_interaction="suspicious_gesture"

🔗 References

📤 Share & Export