CVE-2026-5919
WebSocket Input Validation Bypass in Chrome Renderer Process
Publication date: 2026-04-08
Last updated on: 2026-04-29
Assigner: Chrome
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| chrome | to 147.0.7727.55 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves insufficient validation of untrusted input in the WebSockets implementation of Google Chrome versions prior to 147.0.7727.55. It allows a remote attacker, who has already compromised the renderer process, to bypass the same origin policy by using a specially crafted HTML page.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an attacker to bypass the same origin policy, potentially enabling them to access or manipulate data from other origins within the browser. This could lead to unauthorized data access or actions within the context of the compromised renderer process.