Cyber Posture

CVE-2026-5287

High

Published: 01 April 2026

Published
01 April 2026
Modified
02 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0003 8.8th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-5287 is a high-severity Use After Free (CWE-416) vulnerability in Google Chrome. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 8.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Mandates timely identification, reporting, and correction of software flaws, directly requiring patching of the use-after-free vulnerability in Chrome's PDF rendering engine.

prevent

Implements memory protection safeguards such as ASLR and DEP to prevent unauthorized code execution from use-after-free memory corruption in the PDF component.

detect

Requires vulnerability scanning and monitoring to identify systems running vulnerable versions of Google Chrome affected by CVE-2026-5287.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Use-after-free in Chrome PDF renderer enables RCE via crafted malicious PDF requiring user interaction to open, directly mapping to client-side exploitation and malicious file user execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Use after free in PDF in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High)

Deeper analysisAI

CVE-2026-5287 is a use-after-free vulnerability (CWE-416) in the PDF component of Google Chrome versions prior to 146.0.7680.178. The flaw affects the Chromium-based browser's PDF rendering engine, where an object is freed but later accessed, leading to potential memory corruption. Google rated it as high severity under Chromium security standards, with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high impact on confidentiality, integrity, and availability.

A remote attacker can exploit this vulnerability by crafting a malicious PDF file and tricking a user into opening it within Google Chrome. No privileges are required, but user interaction is needed to process the file. Successful exploitation allows arbitrary code execution inside the browser's sandbox, potentially enabling further attacks within the constrained environment, such as data theft or additional sandbox escapes if chained with other flaws.

Mitigation is addressed in Google Chrome version 146.0.7680.178 and later, as detailed in the stable channel update on the Chrome Releases blog (https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html) and the corresponding Chromium issue tracker (https://issues.chromium.org/issues/494644471). Security practitioners should ensure users update to the patched version promptly and advise caution with untrusted PDF files.

Details

CWE(s)

Affected Products

google
chrome
≤ 146.0.7680.177

CVEs Like This One

CVE-2025-8576Same product: Apple Macos
CVE-2026-4458Same product: Apple Macos
CVE-2026-5860Same product: Apple Macos
CVE-2026-7349Same product: Apple Macos
CVE-2026-3923Same product: Apple Macos
CVE-2025-11756Same product: Apple Macos
CVE-2026-3921Same product: Apple Macos
CVE-2025-8578Same product: Apple Macos
CVE-2026-7338Same product: Apple Macos
CVE-2026-6316Same product: Apple Macos

References