Critical Chrome Zero-Day CVE-2026-5281 Actively Exploited: Update Immediately

Critical Chrome Zero-Day Vulnerability Exploited in the Wild—Immediate Update Required

Google has urgently released a security update for its Chrome browser to address a critical zero-day vulnerability, identified as CVE-2026-5281, which is currently being actively exploited. This flaw resides in Dawn, Chrome’s cross-platform GPU abstraction layer utilized for implementing WebGPU. The vulnerability is a use-after-free issue, a type of memory corruption that occurs when a program continues to reference memory after it has been freed. Such vulnerabilities can be exploited by attackers to execute arbitrary code or escape the browser’s security sandbox, potentially leading to system compromise.

The vulnerability was discovered and reported by an anonymous researcher on March 10, 2026. Google has confirmed the active exploitation of this flaw, stating, An exploit for CVE-2026-5281 exists in the wild. To mitigate this risk, Google has updated the Stable channel to version 146.0.7680.177/178 for Windows and Mac, and 146.0.7680.177 for Linux. The rollout is expected to reach all users over the coming days and weeks.

In addition to addressing CVE-2026-5281, this update includes fixes for 21 other security vulnerabilities, 19 of which are rated as high severity. These vulnerabilities span various Chrome subsystems, highlighting the importance of maintaining up-to-date software to ensure system security.

Notable vulnerabilities patched in this release include:

– CVE-2026-5273: Use-after-free in CSS, reported on March 18.

– CVE-2026-5272: Heap buffer overflow in GPU, reported on March 11.

– CVE-2026-5274: Integer overflow in Codecs, reported on March 1.

– CVE-2026-5275: Heap buffer overflow in ANGLE, reported on March 4.

– CVE-2026-5276: Insufficient policy enforcement in WebUSB, reported on March 4.

– CVE-2026-5278: Use-after-free in Web MIDI, reported on March 6.

– CVE-2026-5279: Object corruption in V8, reported on March 8.

– CVE-2026-5280: Use-after-free in WebCodecs, reported on March 11.

– CVE-2026-5284: Use-after-free in Dawn, reported on March 12.

– CVE-2026-5285: Use-after-free in WebGL, reported on March 13.

– CVE-2026-5287: Use-after-free in PDF, reported on March 21.

– CVE-2026-5288: Use-after-free in WebView, reported by Google on March 23.

– CVE-2026-5289: Use-after-free in Navigation, reported by Google on March 25.

– CVE-2026-5290: Use-after-free in Compositing, reported by Google on March 25.

The prevalence of use-after-free vulnerabilities across multiple components such as Dawn, WebGL, WebCodecs, Web MIDI, WebView, Navigation, and Compositing underscores ongoing challenges in ensuring memory safety within browser rendering pipelines. Notably, three of the high-severity patches were reported directly by Google’s internal security teams, indicating proactive threat hunting and internal security assessments.

Immediate Action Required:

All Chrome users running versions prior to 146.0.7680.177 on Linux or 146.0.7680.178 on Windows and Mac are at risk. Given the confirmed active exploitation of CVE-2026-5281, it is imperative for users and organizations to update their browsers without delay.

To update Chrome:

1. Open Chrome and click on the three-dot menu icon in the top-right corner.

2. Navigate to Help and select About Google Chrome.

3. Chrome will automatically check for updates and apply the latest version.

4. Restart the browser to complete the update process.

Organizations managing Chrome deployments through enterprise policies should prioritize pushing version 146.0.7680.177/178 across their environments immediately.

Understanding Use-After-Free Vulnerabilities:

Use-after-free vulnerabilities occur when a program continues to use a pointer after it has been freed, leading to undefined behavior. In the context of web browsers, such vulnerabilities can be exploited by attackers to execute arbitrary code, potentially leading to full system compromise. These flaws are particularly dangerous because they can be triggered by simply visiting a malicious webpage, requiring minimal user interaction.

The Importance of Timely Updates:

Regularly updating software is a critical component of maintaining cybersecurity. Cybercriminals often exploit known vulnerabilities to gain unauthorized access to systems. By keeping software up to date, users can protect themselves against known threats and reduce the risk of exploitation.

Conclusion:

The active exploitation of CVE-2026-5281 highlights the persistent threats posed by zero-day vulnerabilities. Google’s swift response in releasing a patch underscores the importance of vigilance and prompt action in the face of emerging security threats. Users and organizations are urged to update their Chrome browsers immediately to safeguard against potential attacks.