CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 01, 2026

New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released

The Hacker News Archived Apr 01, 2026 ✓ Full text saved

Google on Thursday released security updates for its Chrome web browser to address 21 vulnerabilities, including a zero-day flaw that it said has been exploited in the wild. The high-severity vulnerability, CVE-2026-5281 (CVSS score: N/A), concerns a use-after-free bug in Dawn, an open-source and cross-platform implementation of the WebGPU standard. "Use-after-free in Dawn in Google Chrome prior

Full text archived locally
✦ AI Summary · Claude Sonnet


    New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released Ravie LakshmananApr 01, 2026Vulnerability / Browser Security Google on Thursday released security updates for its Chrome web browser to address 21 vulnerabilities, including a zero-day flaw that it said has been exploited in the wild. The high-severity vulnerability, CVE-2026-5281 (CVSS score: N/A), concerns a use-after-free bug in Dawn, an open-source and cross-platform implementation of the WebGPU standard. "Use-after-free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page," according to a description of the flaw in the NIST's National Vulnerability Database (NVD). As is customary for these alerts, Google did not provide any further details on how the shortcoming is being exploited and who may be behind the effort. This is typically done so as to ensure that a majority of users are updated with a fix and prevent other actors from joining the exploitation bandwagon. "Google is aware that an exploit for CVE-2026-5281 exists in the wild," the company acknowledged. The development arrives merely after Google shipped fixes for two high-severity flaws (CVE-2026-3909 and CVE-2026-3910) that were exploited as zero-days. In February, the tech giant also addressed an actively exploited use-after-free bug in Chrome's CSS component (CVE-2026-2441). In total, Google has patched a total of four actively weaponized Chrome zero-days since the start of the year. For optimal protection, users are advised to update their Chrome browser to versions 146.0.7680.177/178 for Windows and Apple macOS, and 146.0.7680.177 for Linux. To make sure the latest updates are installed, users can navigate to More > Help > About Google Chrome and select Relaunch. Users of other Chromium-based browsers, such as Microsoft Edge, Brave, Opera, and Vivaldi, are also advised to apply the fixes as and when they become available. Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post. SHARE     Tweet Share Share SHARE  browser security, Chromium, cybersecurity, Google Chrome, remote code execution, Vulnerability, WebGPU, zero-day Trending News FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in Recent Mass Attacks TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 via Trivy CI/CD Compromise Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks Apple Warns Older iPhones Vulnerable to Coruna, DarkSword Exploit Kit Attacks ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits and 20 More Stories CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files ⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers and More China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks 54 EDR Killers Use BYOVD to Exploit 35 Signed Vulnerable Drivers and Disable Security FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams Load More ▼ Popular Resources Detect AI-Driven Threats Faster With Full Network Visibility SANS SEC401: Get Hands On Skills to Detect and Respond to Cyber Threats [Guide] Learn How to Govern AI Agents With Proven Market Guidance [Demo] Discover SaaS Risks and Monitor Every App in Your Environment
    💬 Team Notes
    Article Info
    Source
    The Hacker News
    Category
    ◇ Industry News & Leadership
    Published
    Apr 01, 2026
    Archived
    Apr 01, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗