CVE-2026-3063

5.4 MEDIUM

📋 TL;DR

This vulnerability allows attackers who convince users to install malicious Chrome extensions to inject scripts or HTML into privileged pages through DevTools. It affects all Google Chrome users prior to version 145.0.7632.116 who install untrusted extensions.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 145.0.7632.116
Operating Systems: Windows, macOS, Linux, ChromeOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user to install a malicious extension; all default Chrome configurations are vulnerable if extension is installed.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of browser session including access to sensitive data, authentication tokens, and ability to perform actions as the user on web applications.

🟠

Likely Case

Data theft from web applications, session hijacking, and unauthorized actions within the user's browser context.

🟢

If Mitigated

Limited impact if users only install trusted extensions from official sources and maintain updated browsers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to install malicious extension; once installed, exploitation is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 145.0.7632.116 and later

Vendor Advisory: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_23.html

Restart Required: Yes

Instructions:

1. Open Chrome menu > Help > About Google Chrome. 2. Chrome will automatically check for updates. 3. If update is available, click 'Update Google Chrome'. 4. Click 'Relaunch' to restart Chrome with the update.

🔧 Temporary Workarounds

Disable Chrome Extensions

all

Temporarily disable all extensions to prevent exploitation while waiting to patch.

chrome://extensions/ > toggle off all extensions

Restrict Extension Installation

windows

Configure Chrome policies to prevent users from installing extensions.

Windows: Group Policy Editor > Computer Configuration > Administrative Templates > Google > Google Chrome > Extensions > Configure extension installation whitelist

🧯 If You Can't Patch

  • Implement strict extension whitelisting policies to only allow approved extensions
  • Educate users about risks of installing untrusted extensions and implement security awareness training

🔍 How to Verify

Check if Vulnerable:

Check Chrome version: if version is less than 145.0.7632.116, system is vulnerable.

Check Version:

chrome://version/

Verify Fix Applied:

Verify Chrome version is 145.0.7632.116 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual DevTools activity logs
  • Extension installation events from untrusted sources
  • Script injection attempts in privileged contexts

Network Indicators:

  • Unexpected outbound connections from Chrome to unknown domains
  • Data exfiltration patterns from browser sessions

SIEM Query:

source="chrome_security_logs" AND (event="extension_install" AND source!="chrome_web_store" OR event="devtools_privileged_access")

🔗 References

📤 Share & Export