PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-9118 Google CVE debrief

CVE-2026-9118 is a high-severity use-after-free flaw in Chrome’s XR handling on Windows that could let a remote attacker execute arbitrary code if a user opens a crafted HTML page. The issue is tracked as CWE-416 and carries a CVSS 3.1 score of 8.8, reflecting network attackability with user interaction required.

Vendor
Google
Product
Chrome
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-20
Original CVE updated
2026-05-21
Advisory published
2026-05-20
Advisory updated
2026-05-21

Who should care

Windows users running Google Chrome, enterprise browser administrators, endpoint security teams, and SOC analysts should care most. Any environment that allows routine browsing of untrusted web content is in scope.

Technical summary

According to the NVD record and Chrome’s release note reference, the flaw is a use-after-free in the XR area of Google Chrome on Windows affecting versions prior to 148.0.7778.179. The reported attack path is a crafted HTML page, which aligns with the published CVSS vector (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The supplied source data identifies the weakness as CWE-416 and associates the fix with Chrome’s stable channel update.

Defensive priority

High. This is a remotely reachable browser memory-safety issue with potential code execution impact, and the vendor-published fix is available. Even though user interaction is required, the combination of browser exposure and high CVSS severity makes prompt patching important.

Recommended defensive actions

  • Update Google Chrome on Windows to 148.0.7778.179 or later as soon as possible.
  • Prioritize rollout to users who regularly browse untrusted or externally supplied web content.
  • Verify fleet compliance with the fixed Chrome version and remediate stragglers.
  • Treat unknown HTML content and unsolicited page links as elevated risk until patching is complete.
  • Monitor browser update channels and endpoint telemetry for abnormal crashes or exploitation indicators around the affected versions.

Evidence notes

The vulnerability description, severity, and affected version come from the supplied NVD record. The Chrome stable-channel advisory and Chromium issue tracker are the only provided source references supporting vendor/product context. The CVSS vector and CWE-416 classification are taken from the source item metadata. Vendor metadata in the corpus is low-confidence/ambiguous, so the debrief avoids over-claiming beyond the official Chrome references.

Official resources

Publicly disclosed on 2026-05-20 in the NVD record, with a Chrome stable-channel update reference published the same day.