CVE-2026-5908
Published: 08 April 2026
Summary
CVE-2026-5908 is a high-severity External Control of Assumed-Immutable Web Parameter (CWE-472) vulnerability in Google Chrome. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 26.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely patching of the integer overflow vulnerability in Chrome's Media component to version 147.0.7727.55 or later, eliminating the flaw.
Implements memory protections like ASLR and DEP to mitigate heap corruption exploitation from the integer overflow triggered by crafted video files.
Requires vulnerability scanning to identify systems running vulnerable Chrome versions affected by CVE-2026-5908, enabling proactive remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an integer overflow in Chrome's media processing that enables heap corruption and potential RCE when a user opens a crafted video file, directly mapping to Exploitation for Client Execution (T1203) and User Execution via Malicious File (T1204.002).
NVD Description
Integer overflow in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted video file. (Chromium security severity: Low)
Deeper analysisAI
CVE-2026-5908 is an integer overflow vulnerability in the Media component of Google Chrome prior to version 147.0.7727.55. The flaw enables a remote attacker to potentially trigger heap corruption by processing a crafted video file. It is classified under CWE-472 and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), despite Chromium's assessment of low security severity.
A remote attacker without privileges can exploit this vulnerability over the network with low complexity by tricking a user into interacting with a malicious video file, such as opening it in Chrome. Successful exploitation could compromise confidentiality, integrity, and availability at a high level, potentially allowing heap corruption that leads to code execution or system compromise on the targeted machine.
Mitigation is available via the stable channel update to Google Chrome 147.0.7727.55 or later, as detailed in the Chrome Releases blog at https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html and the Chromium issue tracker at https://issues.chromium.org/issues/485115554. Security practitioners should prioritize updating affected browsers and educating users on risks from untrusted media files.
Details
- CWE(s)