Cyber Posture

CVE-2026-6319

High

Published: 15 April 2026

Published
15 April 2026
Modified
17 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0005 14.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-6319 is a high-severity Use After Free (CWE-416) vulnerability in Google Chrome. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 14.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely remediation of the specific use-after-free flaw in Chrome via patching to version 147.0.7727.101 or later.

prevent

Implements memory protection mechanisms that comprehensively prevent unauthorized memory access and deallocation errors exploited in this use-after-free vulnerability.

detect

Requires vulnerability scanning to identify and prioritize the known Chrome Payments use-after-free vulnerability for remediation.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Use-after-free vulnerability in Chrome client application on Android enables arbitrary code execution when a crafted HTML page is visited with specific user gestures, directly mapping to Exploitation for Client Execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Use after free in Payments in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Medium)

Deeper analysisAI

CVE-2026-6319 is a use-after-free vulnerability (CWE-416) in the Payments component of Google Chrome on Android, affecting versions prior to 147.0.7727.101. Published on 2026-04-15, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) and is rated Medium severity by Chromium security.

A remote attacker can exploit this vulnerability by convincing a user to perform specific UI gestures while visiting a crafted HTML page, leading to arbitrary code execution. The attack requires network access with no privileges but demands high complexity and user interaction.

Mitigation is available via the stable channel update for Google Chrome on Android to version 147.0.7727.101 or later, as detailed in the Chrome Releases blog post at https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html and the corresponding Chromium issue at https://issues.chromium.org/issues/499018889. Security practitioners should prioritize updating affected devices.

Details

CWE(s)

Affected Products

google
chrome
≤ 147.0.7727.101

CVEs Like This One

CVE-2025-0762Same product: Google Chrome
CVE-2025-0997Same product: Google Chrome
CVE-2026-6315Same product: Google Chrome
CVE-2025-1916Same product: Google Chrome
CVE-2026-6358Same product: Google Chrome
CVE-2025-0995Same product: Google Chrome
CVE-2025-2136Same product: Google Chrome
CVE-2026-6359Same product: Google Chrome
CVE-2025-1006Same product: Google Chrome
CVE-2025-2476Same product: Google Chrome

References