Back to Articles
high

HIGH: Chrome Zero-Day Number Four Just Dropped: CVE-2026-5281 Hits the WebGPU Stack

Google patched CVE-2026-5281, a high-severity use-after-free vulnerability in Chrome's Dawn WebGPU implementation that is being actively exploited in the wild. This marks the fourth Chrome zero-day of 2026, and CISA has already added it to the Known Exploited Vulnerabilities catalog.

By Danny Mercer, CISSP — Lead Security Analyst Apr 2, 2026
Is your business exposed? Our McKinney-based security team can assess your risk for free.
Share:

Google just patched another actively exploited Chrome zero-day, making it the fourth such vulnerability discovered in the wild since January. CVE-2026-5281 is a high-severity use-after-free bug in Dawn, the open-source WebGPU implementation that powers hardware-accelerated graphics in Chrome and other Chromium-based browsers. If you have not updated Chrome in the last 48 hours, now would be an excellent time to do so.

The vulnerability allows a remote attacker who has already compromised the renderer process to execute arbitrary code through a specially crafted HTML page. In practical terms, this means visiting a malicious website could be enough to let an attacker run code on your system. Google acknowledged that an exploit for CVE-2026-5281 exists in the wild, though the company has not disclosed who is behind the attacks or how widespread exploitation has become. This opacity is standard practice for Google, which typically waits until most users have patched before releasing technical details that could help other attackers reverse-engineer the exploit.

Dawn handles WebGPU operations across platforms, providing a unified interface for GPU compute and rendering that works on Windows, macOS, Linux, and even ChromeOS. The WebGPU API represents the next generation of browser-based graphics, designed to replace the aging WebGL standard with something closer to modern graphics APIs like Vulkan, Metal, and Direct3D 12. This power comes with complexity, and that complexity creates attack surface. Use-after-free vulnerabilities in graphics components are particularly dangerous because the GPU has privileged access to system memory and can be manipulated to bypass traditional security boundaries.

Attackers have increasingly targeted browser graphics stacks over the past two years as traditional JavaScript engine exploits have become harder to pull off. Browser vendors have invested enormous resources into hardening their JavaScript engines, implementing mitigations like Control Flow Integrity and memory tagging that make exploitation significantly more difficult. Graphics subsystems have not received the same level of attention, making them attractive targets for sophisticated threat actors who need reliable exploitation paths.

The technical nature of this vulnerability deserves some explanation for those managing security programs. A use-after-free occurs when a program continues to reference memory after that memory has been deallocated and potentially reallocated for a different purpose. In the context of Dawn and WebGPU, this could happen when a graphics resource is freed but the code continues to hold a pointer to where that resource used to live. If an attacker can control what gets allocated into that freed memory slot, they can manipulate the program into treating attacker-controlled data as a legitimate graphics object, potentially leading to arbitrary code execution.

The renderer process compromise prerequisite mentioned in the vulnerability description is not as limiting as it might sound. Modern browsers use process isolation to contain the damage from exploited vulnerabilities, with the renderer process handling most web content in a sandboxed environment. However, attackers frequently chain multiple vulnerabilities together, using an initial bug to gain code execution in the renderer and then a second bug to escape the sandbox. CVE-2026-5281 could serve either role in such a chain, depending on what other vulnerabilities an attacker has available.

The fix landed in Chrome version 146.0.7680.177 for Linux and 146.0.7680.178 for Windows and macOS. To verify your installation is current, open Chrome, navigate to the three-dot menu in the upper right corner, select Help, and then click About Google Chrome. The browser will check for updates automatically and prompt you to relaunch once the patch is installed. Do not skip the relaunch step. Chrome downloads updates in the background but does not apply them until you restart the browser, which means you could be running vulnerable code for days if you are the type who never closes your browser.

CISA moved quickly on this one, adding CVE-2026-5281 to the Known Exploited Vulnerabilities catalog on April 1st. Federal Civilian Executive Branch agencies now have until April 15th to deploy the update, giving them just two weeks to patch every Chrome installation across government networks. Private organizations would be wise to treat the KEV listing as their own deadline, since being on that list means real attackers are actively using this vulnerability against real targets right now.

The KEV catalog has become an increasingly important resource for security teams trying to prioritize their patching efforts. With thousands of CVEs published each year, no organization can patch everything immediately. The KEV catalog cuts through the noise by identifying vulnerabilities that are confirmed to be under active exploitation, letting security teams focus their limited resources on the threats that matter most. When CISA adds something to the KEV, it is a signal to drop what you are doing and patch.

This marks the fourth Chrome zero-day of 2026, joining CVE-2026-3909 and CVE-2026-3910 from March and CVE-2026-2441 from February. That earlier vulnerability was also a use-after-free bug, though it affected Chrome's CSS component rather than the graphics stack. The frequency of these discoveries suggests that sophisticated threat actors continue to invest heavily in browser exploitation research, likely because browsers remain the primary gateway to enterprise networks in an era of cloud applications and remote work.

The pattern is worth examining more closely. Each of these zero-days was discovered because someone caught it being used in actual attacks, not because a security researcher found it during an audit or bug bounty program. That means for every zero-day that gets caught and patched, there are potentially others still being used quietly against high-value targets. Nation-state actors and commercial spyware vendors are the usual suspects for this kind of activity, as they have both the resources to discover these vulnerabilities and the operational security to avoid burning them unnecessarily.

Organizations running Chromium-based browsers other than Chrome should pay attention as well. Microsoft Edge, Brave, Opera, and Vivaldi all share the same underlying codebase, which means they share the same vulnerability. These browsers typically release their own patches within a few days of Chrome updates, so administrators should monitor for updates from their respective vendors and deploy them as soon as they become available. Do not assume that because you are not running Chrome proper that you are safe.

Enterprise environments face particular challenges with browser patching. Users often have administrative rights to install and update browsers on their own machines, which sounds convenient until you realize it means you have no centralized visibility into what versions are actually running across your fleet. Group Policy can help enforce Chrome updates in Windows environments, and mobile device management solutions can manage browser versions on corporate devices, but these controls only work if they are actually configured and monitored.

For managed service providers and IT departments, this vulnerability represents an opportunity to validate that your browser management strategy actually works. Run a report on Chrome versions across your managed endpoints. If you find machines still running versions older than 146.0.7680.177, you have a gap in your patching process that needs to be addressed. Use this incident as a test case. If you cannot patch browsers quickly when a zero-day drops, you have a problem that goes beyond any single CVE.

The practical takeaway here is simple but urgent. Update Chrome on every machine you manage, verify the update actually installed, and do not assume automatic updates handled it for you. In enterprise environments, this means pushing the update through your patch management system and validating deployment across endpoints. The attackers exploiting this vulnerability are not waiting around, and neither should you.

Browser security has become synonymous with organizational security. When your workforce spends most of their day in a browser accessing cloud applications, email, and collaboration tools, every browser vulnerability is effectively a vulnerability in your entire technology stack. Treat browser patching with the same urgency you would apply to patching your firewall or your domain controllers. The threat actors certainly do.

References

  • Chrome Releases Blog

    https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html

  • CISA KEV Catalog

    https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Concerned about this threat?

Our security team can assess your exposure and recommend immediate actions.

Get a Free Assessment →