CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◉ Threat Intelligence

Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel

Palo Alto Unit 42 Archived Mar 16, 2026 ✓ Full text saved

A high-severity CVE-2026-0628 in Chrome's Gemini allowed local file access and privacy invasion. Google quickly patched the flaw. The post Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel appeared first on Unit 42 .

Full text archived locally
✦ AI Summary · Claude Sonnet


    Executive Summary We uncovered a High severity security vulnerability CVE-2026-0628 in Google's implementation of the new Gemini feature in Chrome. This vulnerability allows the attacker to tap into the browser environment and access files on the local operating system. Specifically, this vulnerability could have allowed malicious extensions with basic permissions to hijack the new Gemini Live in Chrome browser panel. Such an attack could have led to privilege escalation, enabling actions including: Accessing the victim’s camera and microphone without consent Taking screenshots of any website Accessing local files and directories We responsibly disclosed this vulnerability to Google and assisted in remediation efforts, and they released a fix in early January prior to the publication of this information. Palo Alto Networks customers are better protected through the following products and services: Prisma Browser is designed to prevent extension-based attacks like the one uncovered in our research. If you think you might have been compromised or have an urgent matter, contact the Unit 42 Incident Response team. Related Unit 42 Topics CVE-2026-0628, GenAI, Google Chrome AI Browsers: A New Wave of Productivity The terms “agentic browser” or “AI browser” refer to a new class of web browsers that integrate AI assistants. AI browsers include Atlas, Comet, Copilot in Edge and Gemini in Chrome. At the heart of their offering is an AI side panel assistant capable of real-time content summarization, automated task execution and dynamic assistance for contextual understanding of the active webpage. Figure 1 shows Google Chrome’s Gemini Live in Chrome AI assistant summarizing a webpage. Figure 1. Google’s Gemini Live in Chrome browser AI assistant. Source: Google Chrome on YouTube. By granting the AI direct, privileged access to the browsing environment, AI browsers are capable of performing complex, multi-step operations that were previously impossible or required several extensions and manual steps. To effectively manage these day-to-day tasks, these agents require a "multimodal" perspective — essentially seeing exactly what the user sees on screen. Furthermore, they rely on the webpage itself to provide instructions and context, allowing the AI to interpret and act on the site’s specific interface. However, this same expanded capability and privileged access introduce a new and widened attack surface. This creates security implications that are not present in traditional browsers. Fusing AI Into the Browser: Security Hazards This shift in browser architecture creates a new, two-pronged security challenge. First, the highly privileged and interactive AI assistant introduces novel risks by potentially allowing attackers to issue commands to the browser core itself. As we discussed in our previous article, a malicious webpage could instruct an AI to perform actions that would be blocked by a conventional browser's security model, via advanced prompt injection techniques. These actions include: Exfiltrating data Bypassing the same-origin policy (SOP) Triggering privileged browser functions The AI acts as a new intermediary with overly broad access. Secondly, the integration of a complex, new component like the AI side panel inevitably reintroduces classic, foundational browser security risks. By placing this new component within the high-privilege context of the browser, developers could inadvertently create new logical flaws and implementation weaknesses. This could include vulnerabilities related to cross-site scripting (XSS), privilege escalation and side-channel attacks that can be exploited by less-privileged websites or browser extensions, which is the focus of this analysis. Extensions Security: Understanding the Threat Model Browser extensions operate under a defined set of permissions, strictly governed by the browser’s security model. One of their functions is to interact with or modify content on webpages. These webpages are considered inferior to the extension itself in the browser's privilege hierarchy. Crucially, the security architecture of modern browsers is designed with strong isolation mechanisms. An extension is explicitly restricted from interfering with or commanding another extension, as its execution environment is logically partitioned. Even more fundamentally, an extension is prevented from gaining unauthorized control over core, high-privilege browser-level components or processes. This strict boundary is a core tenet of the browser's threat model, and for good reason. If extensions had the power to undermine their host (the browser), this would result in a severe security issue. The Vulnerability in Gemini Live in Chrome We discovered a vulnerability in Chrome’s new Gemini feature that could have directly undermined the threat model described above. We found that an extension with access to a basic permission set through the declarativeNetRequests API allowed permissions that could have enabled an attacker to inject JavaScript code into the new Gemini panel. The capability of the declarativeNetRequests API allows extensions to intercept and change properties of HTTPS web requests and responses. This can be used for legitimate purposes, such as how AdBlock stops requests that could lead to privacy-undermining ads. This capability is allowed by design, for extensions to intercept and influence the contents of hxxps[:]//gemini.google[.]com/app when the URL is loaded under an ordinary website tab. However, we found a security flaw in the ability to intercept and change properties of hxxps[:]//gemini.google[.]com/app when it’s loaded within the Gemini panel. The difference matters: Intercepting and injecting JavaScript code into the Gemini web app when loaded via an ordinary tab is trivial and doesn’t grant access to special powers. However, when the Gemini app is loaded within this new panel component, Chrome hooks it with access to powerful capabilities. These include being able to read local files, take screenshots, access the camera and microphone and more, so the app could perform complex tasks. Being able to intercept it under that setting would have allowed attackers to gain access to these powers too. This difference in what type of component loads the Gemini app is the line between by-design behavior and a security flaw. An extension influencing a website is expected. However, an extension influencing a component that is baked into the browser is a serious security risk. Privilege Escalation: Camera, Files, Screenshots and More This risk could have allowed attackers to run arbitrary code at hxxps[:]//gemini.google[.]com/app under the new Gemini browser panel. Being a privileged component of the browser itself, code running within the Gemini panel could access capabilities unavailable to the extension that injected the code initially. In our report to Google, we demonstrated how an ordinary extension could hijack the Gemini panel and perform the following activities: Start the camera and microphone of the browser without asking for user consent Reach local files and directories of the underlying operating system Take screenshots of tabs showing any website that serves over HTTPS Hijack the panel into carrying out a phishing attack Displaying phishing content in this manner is dangerous, because the Gemini side panel integrated into the browser is an otherwise trusted component. Of note, web content in a phishing layout is highly dangerous, given that the hijacked component (the Gemini panel) is a part of the browser. We could accomplish the above actions while requiring no user interaction, other than starting Gemini by clicking the Gemini button from the browser window's title bar. Since the Gemini app relies on performing actions for legitimate purposes, hijacking the Gemini panel allows privileged access to system resources that an extension would not normally have. Risk Averted: How Could This Have Turned Out? Extension-based attacks are often not considered very interesting, given the prerequisites extensions generally require for their initial installation. This understanding is based on the context of conventional browsers. The evolution of browsers integrating AI presents additional risks that add more weight to how dangerous extension-based attacks can be. In addition to this risk, the number of malicious extensions that attackers have deployed to web stores in recent years has grown. While these malicious extensions are often quickly removed, a substantial number of victims could install them before their removal. We have also seen legitimate extensions hijacked or sold to malicious actors who released new malicious versions to already installed endpoints. Within an enterprise, a malicious extension gaining access to the camera, microphone and local files of workers is a real danger to the organization. Timeline: From Discovery to Fix Immediately after discovery, we responsibly disclosed this vulnerability to Google on Oct. 23, 2025. Google was able to reproduce the conditions to exploit the vulnerability, and issued a fix in early January 5m 2026. Conclusion This article describes a specific vulnerability and highlights the security gaps emerging from current efforts to integrate AI features into web browsers. While AI browsers or AI features implemented into existing browsers can improve the user experience, it’s important to continue monitoring for potential security flaws. Palo Alto Networks Protection and Mitigation Palo Alto Networks customers are better protected from the threats discussed above through the following products: Prisma Browser is designed to prevent extension-based attacks like the one uncovered in our research. Prisma Browser customers are better protected against general phishing threats mentioned in this blog with Advanced Web Protection (Live Page Scanning) feature enabled. Advanced Web Protection: We continuously monitor installed extensions for anomalous behavior, privilege abuse and runtime manipulation. Our dedicated browser security team identifies, analyzes and proactively mitigates new threats. We feed those protections directly into the product. ​​Advanced URL Filtering and Advanced DNS Security customers are better protected against pages hosting malicious JavaScript. If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call: North America: Toll Free: +1 (866) 486-4842 (866.4.UNIT42) UK: +44.20.3743.3660 Europe and Middle East: +31.20.299.3130 Asia: +65.6983.8730 Japan: +81.50.1790.0200 Australia: +61.2.4062.7950 India: 000 800 050 45107 South Korea: +82.080.467.8774 Palo Alto Networks has shared these findings with our fellow Cyber Threat Alliance (CTA) members. CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt malicious cyber actors. Learn more about the Cyber Threat Alliance. Back to top TAGS CVE-2026-0628 GenAI Google Chrome Threat Research Center Next: Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security TABLE OF CONTENTS Executive Summary AI Browsers: A New Wave of Productivity Fusing AI Into the Browser: Security Hazards Extensions Security: Understanding the Threat Model The Vulnerability in Gemini Live in Chrome Privilege Escalation: Camera, Files, Screenshots and More Risk Averted: How Could This Have Turned Out? Timeline: From Discovery to Fix Conclusion Palo Alto Networks Protection and Mitigation RELATED ARTICLES Fooling AI Agents: Web-Based Indirect Prompt Injection Observed in the Wild Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran Securing Vibe Coding Tools: Scaling Productivity Without Scaling Risk Related Malware Resources HIGH PROFILE THREATS February 11, 2026 Nation-State Actors Exploit Notepad++ Supply Chain DLL Sideloading Cobalt Strike Backdoor Read now THREAT RESEARCH January 22, 2026 The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time API DeepSeek Google Read now THREAT RESEARCH January 2, 2026 VVS Discord Stealer Using Pyarmor for Obfuscation and Detection Evasion Discord Infostealer Python Read now THREAT RESEARCH March 12, 2026 Suspected China-Based Espionage Operation Against Military Targets in Southeast Asia Advanced Persistent Threat AppleChris Backdoor Read now THREAT RESEARCH March 10, 2026 Auditing the Gatekeepers: Fuzzing "AI Judges" to Bypass Security Controls AI Fuzzing LLM Read now THREAT RESEARCH March 6, 2026 An Investigation Into Years of Undetected Operations Targeting High-Value Sectors CL-UNK-1068 DLL Sideloading Fast Reverse Proxy Read now THREAT RESEARCH March 3, 2026 Fooling AI Agents: Web-Based Indirect Prompt Injection Observed in the Wild Agentic AI GenAI Indirect Prompt Injection Read now HIGH PROFILE THREATS March 2, 2026 Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran APK DDoS attacks GenAI Read now THREAT RESEARCH February 13, 2026 Phishing on the Edge of the Web and Mobile Using QR Codes Phishing QR Codes Social engineering Read now HIGH PROFILE THREATS February 11, 2026 Nation-State Actors Exploit Notepad++ Supply Chain DLL Sideloading Cobalt Strike Backdoor Read now THREAT RESEARCH January 22, 2026 The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time API DeepSeek Google Read now THREAT RESEARCH January 2, 2026 VVS Discord Stealer Using Pyarmor for Obfuscation and Detection Evasion Discord Infostealer Python Read now THREAT RESEARCH March 12, 2026 Suspected China-Based Espionage Operation Against Military Targets in Southeast Asia Advanced Persistent Threat AppleChris Backdoor Read now THREAT RESEARCH March 10, 2026 Auditing the Gatekeepers: Fuzzing "AI Judges" to Bypass Security Controls AI Fuzzing LLM Read now THREAT RESEARCH March 6, 2026 An Investigation Into Years of Undetected Operations Targeting High-Value Sectors CL-UNK-1068 DLL Sideloading Fast Reverse Proxy Read now THREAT RESEARCH March 3, 2026 Fooling AI Agents: Web-Based Indirect Prompt Injection Observed in the Wild Agentic AI GenAI Indirect Prompt Injection Read now HIGH PROFILE THREATS March 2, 2026 Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran APK DDoS attacks GenAI Read now THREAT RESEARCH February 13, 2026 Phishing on the Edge of the Web and Mobile Using QR Codes Phishing QR Codes Social engineering Read now HIGH PROFILE THREATS February 11, 2026 Nation-State Actors Exploit Notepad++ Supply Chain DLL Sideloading Cobalt Strike Backdoor Read now THREAT RESEARCH January 22, 2026 The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time API DeepSeek Google Read now THREAT RESEARCH January 2, 2026 VVS Discord Stealer Using Pyarmor for Obfuscation and Detection Evasion Discord Infostealer Python Read now
    💬 Team Notes
    Article Info
    Source
    Palo Alto Unit 42
    Category
    ◉ Threat Intelligence
    Published
    Archived
    Mar 16, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗