CVE-2026-0628
Published: 07 January 2026
Summary
CVE-2026-0628 is a high-severity Missing Authorization (CWE-862) vulnerability in Google Chrome. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Browser Extensions (T1176.001); ranked at the 6.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 CM-11 (User-installed Software) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2026-0628 by requiring timely flaw remediation through patching Google Chrome to version 143.0.7499.192 or later.
Prevents exploitation by prohibiting user installation of unapproved software, including the malicious Chrome extension required for the attack.
Provides malicious code protection mechanisms that can detect and eradicate harmful extensions attempting to inject scripts into privileged WebView pages.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability directly enables bypass of extension policy enforcement, allowing malicious browser extensions to inject into privileged contexts.
NVD Description
Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7499.192 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security…
more
severity: High)
Deeper analysisAI
CVE-2026-0628 is an insufficient policy enforcement vulnerability (CWE-862) in the WebView tag within Google Chrome prior to version 143.0.7499.192. This flaw allows attackers to bypass intended security restrictions in the browser's extension handling, as rated High severity by Chromium with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
An attacker can exploit this vulnerability by convincing a targeted user to install a malicious Chrome extension. Once installed, the crafted extension enables the injection of scripts or HTML into a privileged page, potentially compromising the confidentiality, integrity, and availability of the affected browser context.
Google addressed this issue in the stable channel update for desktop Chrome, as announced in the Chrome Releases blog at https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop.html. Additional details are available in the Chromium issue tracker at https://issues.chromium.org/issues/463155954. Security practitioners should prioritize updating affected systems to version 143.0.7499.192 or later to mitigate the risk.
Details
- CWE(s)