CVE-2026-3539
Heap Corruption via Malicious Extension in Chrome DevTools
Publication date: 2026-03-04
Last updated on: 2026-03-05
Assigner: Chrome
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| chrome | to 145.0.7632.159 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1091 | The product contains a method that accesses an object but does not later invoke the element's associated finalize/destructor method. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an object lifecycle issue in the DevTools component of Google Chrome versions prior to 145.0.7632.159. It allows an attacker who convinces a user to install a malicious Chrome extension to potentially exploit heap corruption by using a specially crafted extension.
How can this vulnerability impact me? :
The vulnerability can lead to heap corruption, which may allow an attacker to execute arbitrary code or cause a denial of service. Since it requires user interaction to install a malicious extension, the attacker must first convince the user to install it. The impact includes potential compromise of confidentiality, integrity, and availability of the affected system.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know