Cyber Posture

CVE-2026-7353

High

Published: 28 April 2026

Published
28 April 2026
Modified
30 April 2026
KEV Added
Patch
CVSS Score 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0002 6.4th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-7353 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Google Chrome. Its CVSS base score is 8.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 6.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-39 (Process Isolation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely remediation of flaws like the Skia heap buffer overflow through patching to Chrome 147.0.7727.138.

prevent

Implements memory protections such as address space layout randomization and data execution prevention to mitigate heap buffer overflow exploitation.

prevent

Enforces process isolation in the renderer sandbox to block potential escapes even if the renderer process is compromised.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Heap buffer overflow in Chrome renderer enables client-side code execution via crafted HTML (T1203) and sandbox escape for privilege escalation (T1068).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Heap buffer overflow in Skia in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

Deeper analysisAI

CVE-2026-7353 is a heap buffer overflow vulnerability (CWE-122) in the Skia graphics library used by Google Chrome versions prior to 147.0.7727.138. This flaw affects the renderer process within Chrome, enabling potential exploitation through malformed inputs. The vulnerability carries a CVSS v3.1 base score of 8.3 (AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H) and is rated High severity by Chromium security standards. It was published on 2026-04-28.

A remote attacker who has already compromised the Chrome renderer process could exploit this vulnerability via a crafted HTML page, potentially achieving a sandbox escape. Exploitation requires user interaction, such as visiting a malicious site, and involves high attack complexity. Successful exploitation could grant elevated privileges, leading to high impacts on confidentiality, integrity, and availability due to the changed scope.

Chrome's stable channel update advisory at https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_28.html details the patch in version 147.0.7727.138. Additional technical details are available in the Chromium issue tracker at https://issues.chromium.org/issues/498809718. Security practitioners should prioritize updating affected Chrome installations to mitigate this issue.

Details

CWE(s)

Affected Products

google
chrome
≤ 147.0.7727.138

CVEs Like This One

CVE-2026-6296Same product: Apple Macos
CVE-2026-5272Same product: Apple Macos
CVE-2025-8879Same product: Apple Macos
CVE-2026-7339Same product: Apple Macos
CVE-2026-3915Same product: Apple Macos
CVE-2026-4448Same product: Apple Macos
CVE-2026-5275Same product: Apple Macos
CVE-2026-5858Same product: Apple Macos
CVE-2026-4463Same product: Apple Macos
CVE-2026-6306Same product: Apple Macos

References