• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new chrome zero day cve 2026 5281 under active exploitation — patch released

New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released

You are here: Home / General Cyber Security News / New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released
April 1, 2026

Google on Thursday released security updates for its Chrome web browser to address 21 vulnerabilities, including a zero-day flaw that it said has been exploited in the wild.

The high-severity vulnerability, CVE-2026-5281 (CVSS score: N/A), concerns a use-after-free bug in Dawn, an open-source and cross-platform implementation of the WebGPU standard.

“Use-after-free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page,” according to a description of the flaw in the NIST’s National Vulnerability Database (NVD).

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


As is customary for these alerts, Google did not provide any further details on how the shortcoming is being exploited and who may be behind the effort. This is typically done so as to ensure that a majority of users are updated with a fix and prevent other actors from joining the exploitation bandwagon.

Cybersecurity

“Google is aware that an exploit for CVE-2026-5281 exists in the wild,” the company acknowledged.

The development arrives merely after Google shipped fixes for two high-severity flaws (CVE-2026-3909 and CVE-2026-3910) that were exploited as zero-days. In February, the tech giant also addressed an actively exploited use-after-free bug in Chrome’s CSS component (CVE-2026-2441). In total, Google has patched a total of four actively weaponized Chrome zero-days since the start of the year.

For optimal protection, users are advised to update their Chrome browser to versions 146.0.7680.177/178 for Windows and Apple macOS, and 146.0.7680.177 for Linux. To make sure the latest updates are installed, users can navigate to More > Help > About Google Chrome and select Relaunch.

Users of other Chromium-based browsers, such as Microsoft Edge, Brave, Opera, and Vivaldi, are also advised to apply the fixes as and when they become available.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «3 reasons attackers are using your trusted tools against you 3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released
  • 3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)
  • Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069
  • Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms
  • Android Developer Verification Rollout Begins Ahead of September Enforcement
  • TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks
  • Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts
  • Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains
  • The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority
  • Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

Copyright © TheCyberSecurity.News, All Rights Reserved.