CVE-2026-2322

5.4 MEDIUM

📋 TL;DR

This vulnerability allows attackers to trick users into interacting with fake UI elements in Chrome's file input interface. Users who visit malicious websites while using vulnerable Chrome versions are affected. The attacker must convince users to perform specific UI gestures on a crafted HTML page.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 145.0.7632.45
Operating Systems: Windows, macOS, Linux, ChromeOS
Default Config Vulnerable: ⚠️ Yes
Notes: All standard Chrome installations are vulnerable. Extensions or security settings don't mitigate this specific UI spoofing issue.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be tricked into uploading sensitive files or performing unintended file operations by interacting with spoofed UI elements that appear legitimate.

🟠

Likely Case

Users might unintentionally select or upload files they didn't intend to, potentially exposing non-critical data or causing minor inconvenience.

🟢

If Mitigated

With proper user awareness and updated browsers, impact is minimal as users would recognize suspicious UI behavior and avoid interacting with untrusted sites.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction with specific UI gestures on a malicious webpage. No authentication bypass or remote code execution is involved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 145.0.7632.45 and later

Vendor Advisory: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html

Restart Required: No

Instructions:

1. Open Chrome settings 2. Click 'About Chrome' 3. Allow Chrome to update automatically 4. Relaunch Chrome if prompted

🔧 Temporary Workarounds

Disable automatic file downloads

all

Configure Chrome to ask where to save files instead of automatically downloading

chrome://settings/content/files

Use site isolation

all

Enable site isolation to limit cross-origin attacks

chrome://flags/#enable-site-per-process

🧯 If You Can't Patch

  • Educate users to avoid clicking on file upload prompts from untrusted websites
  • Implement web filtering to block known malicious domains

🔍 How to Verify

Check if Vulnerable:

Check Chrome version in settings. If version is below 145.0.7632.45, system is vulnerable.

Check Version:

chrome://version/

Verify Fix Applied:

Confirm Chrome version is 145.0.7632.45 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload patterns from web sessions
  • Multiple file selection attempts from single sessions

Network Indicators:

  • Traffic to domains hosting crafted HTML pages with file input elements

SIEM Query:

source="chrome_audit_logs" AND event="file_dialog_interaction" AND user_gesture="suspicious"

🔗 References

📤 Share & Export