Cyber Posture

CVE-2026-7357

High

Published: 28 April 2026

Published
28 April 2026
Modified
30 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0002 6.9th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-7357 is a high-severity Use After Free (CWE-416) vulnerability in Google Chrome. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Drive-by Compromise (T1189); ranked at the 6.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Drive-by Compromise (T1189) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the use-after-free vulnerability in Chrome's GPU by requiring timely installation of patches like version 147.0.7727.138.

prevent

Implements memory protections such as heap hardening, ASLR, and isolation techniques that directly counter use-after-free heap corruption in the GPU process.

prevent

Isolates the GPU process from the compromised renderer, limiting the attacker's ability to trigger heap corruption via inter-process communication from crafted HTML.

MITRE ATT&CK Enterprise TechniquesAI

T1189 Drive-by Compromise Initial Access
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

The use-after-free in Chrome's GPU component is triggered via a crafted HTML page on a malicious site (enabling T1189 drive-by compromise) and allows heap corruption for code execution in the client browser (T1203), though the 'already compromised renderer' phrasing introduces some uncertainty about whether this is a primary or secondary exploit.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Use after free in GPU in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Deeper analysisAI

CVE-2026-7357 is a use-after-free vulnerability (CWE-416) in the GPU component of Google Chrome prior to version 147.0.7727.138. Published on 2026-04-28, it enables potential heap corruption and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H), rated as High severity by the Chromium security team.

The vulnerability can be exploited by a remote attacker who has already compromised the renderer process, using a crafted HTML page to trigger heap corruption. Attackers require network access with no privileges but must achieve high-complexity execution and rely on user interaction, such as visiting a malicious site. Successful exploitation could result in high impacts to confidentiality, integrity, and availability.

Google's stable channel update for desktop, announced at https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_28.html, addresses the issue in Chrome 147.0.7727.138 and later versions. Further technical details are documented in the Chromium issue tracker at https://issues.chromium.org/issues/497047552.

Details

CWE(s)

Affected Products

google
chrome
≤ 147.0.7727.138

CVEs Like This One

CVE-2026-5883Same product: Apple Macos
CVE-2026-4678Same product: Apple Macos
CVE-2026-5877Same product: Apple Macos
CVE-2026-7363Same product: Apple Macos
CVE-2026-4680Same product: Apple Macos
CVE-2026-4446Same product: Apple Macos
CVE-2025-10501Same product: Apple Macos
CVE-2026-5866Same product: Apple Macos
CVE-2026-6317Same product: Apple Macos
CVE-2026-7359Same product: Apple Macos

References