PatchSiren cyber security CVE debrief
CVE-2026-9118 Google CVE debrief
CVE-2026-9118 is a high-severity use-after-free flaw in Chrome’s XR handling on Windows that could let a remote attacker execute arbitrary code if a user opens a crafted HTML page. The issue is tracked as CWE-416 and carries a CVSS 3.1 score of 8.8, reflecting network attackability with user interaction required.
- Vendor
- Product
- Chrome
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-20
- Original CVE updated
- 2026-05-21
- Advisory published
- 2026-05-20
- Advisory updated
- 2026-05-21
Who should care
Windows users running Google Chrome, enterprise browser administrators, endpoint security teams, and SOC analysts should care most. Any environment that allows routine browsing of untrusted web content is in scope.
Technical summary
According to the NVD record and Chrome’s release note reference, the flaw is a use-after-free in the XR area of Google Chrome on Windows affecting versions prior to 148.0.7778.179. The reported attack path is a crafted HTML page, which aligns with the published CVSS vector (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The supplied source data identifies the weakness as CWE-416 and associates the fix with Chrome’s stable channel update.
Defensive priority
High. This is a remotely reachable browser memory-safety issue with potential code execution impact, and the vendor-published fix is available. Even though user interaction is required, the combination of browser exposure and high CVSS severity makes prompt patching important.
Recommended defensive actions
- Update Google Chrome on Windows to 148.0.7778.179 or later as soon as possible.
- Prioritize rollout to users who regularly browse untrusted or externally supplied web content.
- Verify fleet compliance with the fixed Chrome version and remediate stragglers.
- Treat unknown HTML content and unsolicited page links as elevated risk until patching is complete.
- Monitor browser update channels and endpoint telemetry for abnormal crashes or exploitation indicators around the affected versions.
Evidence notes
The vulnerability description, severity, and affected version come from the supplied NVD record. The Chrome stable-channel advisory and Chromium issue tracker are the only provided source references supporting vendor/product context. The CVSS vector and CWE-416 classification are taken from the source item metadata. Vendor metadata in the corpus is low-confidence/ambiguous, so the debrief avoids over-claiming beyond the official Chrome references.
Official resources
-
CVE-2026-9118 CVE record
CVE.org
-
CVE-2026-9118 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
-
Source reference
[email protected] - Permissions Required
Publicly disclosed on 2026-05-20 in the NVD record, with a Chrome stable-channel update reference published the same day.