CVE-2026-6297
Published: 15 April 2026
Summary
CVE-2026-6297 is a high-severity Use After Free (CWE-416) vulnerability in Google Chrome. Its CVSS base score is 8.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Drive-by Compromise (T1189); ranked at the 1.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the use-after-free vulnerability by requiring timely remediation through patching Chrome to version 147.0.7727.101 or later.
Implements memory protections like ASLR and DEP that directly counter exploitation of use-after-free errors in the Chrome Proxy component.
Enhances process isolation and sandboxing to limit the scope and impact of potential sandbox escapes triggered by the vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Use-after-free in Chrome Proxy enables drive-by compromise via crafted HTML on malicious site (T1189), client-side code execution (T1203), and sandbox escape for privilege escalation (T1068).
NVD Description
Use after free in Proxy in Google Chrome prior to 147.0.7727.101 allowed an attacker in a privileged network position to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
Deeper analysisAI
CVE-2026-6297 is a use-after-free vulnerability (CWE-416) in the Proxy component of Google Chrome prior to version 147.0.7727.101. Published on 2026-04-15, it carries a CVSS v3.1 base score of 8.3 (AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H) and is classified as Critical severity by Chromium security.
The vulnerability can be exploited by an attacker in a privileged network position using a crafted HTML page, which requires user interaction such as visiting a malicious site. Successful exploitation enables potential sandbox escape, granting high-impact privileges with changed scope that affect confidentiality, integrity, and availability.
Google Chrome version 147.0.7727.101 addresses the issue. Additional details are available in the Chrome stable channel update at https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html and the Chromium issue tracker at https://issues.chromium.org/issues/493628982.
Details
- CWE(s)