|

Urgent: Chrome Zero‑Day CVE‑2026‑5281 in WebGPU (Dawn) Is Under Active Attack — Update to 146.0.7680.178 Now

If you opened this article in Google Chrome, you’re exactly the person attackers are hoping to reach. The good news: you can cut your risk dramatically by updating right now. The bad news: there’s an actively exploited zero‑day targeting Chrome’s WebGPU implementation (Dawn), and it’s the fourth Chrome zero‑day patched in 2026. Here’s what’s happening, why it matters, and the fast steps to protect yourself and your organization.

According to a new report from The Hacker News, Google has pushed out security updates addressing 21 vulnerabilities, including CVE‑2026‑5281—a high‑severity use‑after‑free bug in Dawn, the open-source engine behind WebGPU in Chrome. Exploitation is confirmed in the wild. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the flaw to its Known Exploited Vulnerabilities (KEV) catalog on April 1, 2026, and even mandated fixes for federal agencies by April 15—an unmistakable signal of urgency.

If you take nothing else from this post: update Chrome to 146.0.7680.178 or later right now.

Let’s break this down in clear, practical terms—no fluff, just what you need to know and do.

The 30‑second version (why this matters)

  • CVE‑2026‑5281 is a high‑severity use‑after‑free vulnerability in Dawn, Chrome’s WebGPU implementation.
  • It can be triggered by a maliciously crafted web page and can let attackers run code in Chrome’s renderer process.
  • Active exploitation is confirmed. CISA flagged it in the KEV catalog and required federal agencies to patch fast.
  • Update Chrome to version 146.0.7680.178 or later to fix it. Other Chromium‑based browsers will also issue updates—patch those too.
  • Enterprises should enforce minimum versions, monitor for unusual WebGPU activity, and hunt for signs of exploitation.

What is CVE‑2026‑5281?

CVE‑2026‑5281 is a use‑after‑free (UAF) vulnerability in Dawn, the open-source component that powers WebGPU in Google Chrome. A UAF happens when software continues to use a chunk of memory after it’s been freed—like reading a book that’s already been returned to the library. Attackers who can manipulate that situation precisely may hijack program flow and execute arbitrary code.

In this case, attackers can lure victims to a booby‑trapped webpage that triggers the bug via WebGPU operations. If successful, they gain code execution inside the renderer process of Chrome.

WebGPU and Dawn, explained (in human language)

  • WebGPU is a modern web standard that allows high‑performance graphics and compute tasks directly in the browser. Think next‑gen 3D, AI/ML workloads, and heavy visualizations—right in a tab.
  • Dawn is Google’s open-source implementation of WebGPU used by Chrome. It bridges the gap between web content and GPU hardware, handling commands securely and efficiently.

Learn more: – WebGPU spec overview: W3C GPU for the Web – Dawn project: dawn.googlesource.com

Why use‑after‑free bugs are prime targets

Memory management bugs like UAFs are catnip for exploit developers because: – They can corrupt memory in controlled ways. – When they occur in attack‑surface code (like web‑exposed APIs), they’re remotely triggerable. – Once you have code execution in the renderer, you can attempt a sandbox escape as a second stage.

Chrome’s multi‑process architecture and sandboxing are strong mitigations, but not foolproof when attackers chain bugs. This is why confirmed exploitation in the wild is so serious.

Who is affected?

  • Affected: Google Chrome versions prior to 146.0.7680.178 on desktop platforms (Windows, macOS, Linux) and Android, if they include the vulnerable Dawn code path. Update to be safe.
  • Likely affected and patching soon (if not already): other Chromium‑based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi. If you use these, update as soon as builds become available.
  • Not affected in the same way on iOS: On iOS and iPadOS, all browsers—including Chrome—must use Apple’s WebKit engine. That means Chrome on iOS doesn’t use Dawn. Still, keep iOS browsers up to date for other fixes.

Check your browser’s “About” page for the exact version: – Chrome: chrome://settings/help (or Menu → Help → About Google Chrome) – Edge: edge://settings/help – Brave: brave://settings/help – Opera: opera://about

What can attackers really do?

With code execution inside Chrome’s renderer, an attacker can: – Run arbitrary code with the renderer’s privileges. – Read and manipulate data in the compromised tab context (page content, same‑origin data). – Step toward a full system compromise if they chain a sandbox escape or abuse other weaknesses. – Steal data, plant malware, or pivot to other accounts via stolen session tokens—depending on the exploit chain.

Key point: a renderer compromise is not the same as “owning your whole machine,” but it’s a major foothold. Active exploitation means adversaries are already pursuing that foothold at scale.

How to protect yourself now

For individuals and small teams

  1. Update Chrome immediately – Go to chrome://settings/help and let it download and install updates. – Ensure you’re at 146.0.7680.178 or later. – Click “Relaunch” to finish.
  2. Update other Chromium browsers – Edge, Brave, Opera, Vivaldi—update them as patches roll out. – Microsoft Edge release notes: Stable channel updates.
  3. Update Chrome on Android – Open Google Play Store → Manage apps & device → Updates → Update Chrome.
  4. Restart your browser – The patch isn’t active until you relaunch. Don’t skip the restart prompt.
  5. Be extra cautious with links – Drive‑by attacks rely on getting you to load a page. Avoid unknown links and suspicious sites until you’re patched.
  6. Keep extensions lean – Fewer extensions = less attack surface and less chance of malicious extension behavior compounding the risk.

For enterprises and security teams

  1. Enforce the minimum version – Use Chrome enterprise policies to require a minimum secure version on managed endpoints: – Policy: MinimumVersionRequired → set to 146.0.7680.178 (or later) – Docs: Chrome Enterprise policies
  2. Accelerate update cadence and relaunch – Encourage (or force) browser relaunch after updates. – Policies to review: RelaunchNotification, RelaunchRecommendedDelay (enterprise policy docs above).
  3. Inventory and prioritize – Identify all Chromium‑based browsers in your fleet (Chrome, Edge, Brave, Opera) and validate versions. – Include VMs, jump hosts, and developer machines, which often run dev/canary builds.
  4. Monitor for exploitation indicators – Unusual or sustained WebGPU activity leading up to a crash/restart of the GPU or renderer process. – Browser crash spikes tied to specific sites. – Suspicious downloads/executions shortly after visiting graphics/compute‑heavy pages.
  5. Add targeted detections and hunts – Map response to MITRE ATT&CK:

    • T1189 Drive‑by Compromise: MITRE ATT&CK T1189
    • T1203 Exploitation for Client Execution: MITRE ATT&CK T1203
    • Correlate browser process trees spawning script interpreters, LOLBins, or installers after web visits.
    • Watch for new scheduled tasks or persistence mechanisms within minutes of a crash/exploit attempt.
  6. Use Chrome Browser Cloud Management (CBCM) or your MDM – Centralize policy enforcement, gather inventory, and push update policies. – Getting started: Chrome Browser Cloud Management guide
  7. Communicate quickly – Send a company‑wide notice: “Update Chrome now and relaunch.” Provide copy‑and‑paste steps and a deadline.
  8. Validate web‑facing controls – Consider interim block or heightened scrutiny for newly registered domains or sites abusing WebGPU features until patch saturation is reached in your org.

Temporary mitigations if you absolutely cannot update yet

  • Switch browsers temporarily to a patched build (e.g., updated Edge) while you work through change controls.
  • Consider limiting access to high‑risk browsing (unknown links, personal browsing on corporate endpoints) until updated.
  • Advanced teams may evaluate disabling WebGPU via internal testing policies or flags, but this is not a universal or guaranteed mitigation. The safest and recommended action remains: update to the fixed version and relaunch.

Technical deep dive (brief, but practical)

Renderer compromise 101

  • Chrome splits tasks across multiple processes. Web content lives in a sandboxed renderer process. The Dawn/WebGPU stack handles GPU operations requested by web code.
  • A UAF in Dawn can be triggered from a webpage, granting arbitrary code execution in the renderer if exploited correctly.
  • From there, attackers attempt to:
  • Steal in‑tab data and tokens.
  • Abuse same‑origin content or cross‑site leaks.
  • Chain to a sandbox escape (a separate vulnerability) for broader system access.

Why WebGPU is a hot target

  • It exposes high‑performance graphics and compute capabilities from the web—complex surfaces that increase the likelihood of subtle memory management bugs.
  • WebGPU brings native‑like performance to the browser, which is great for developers but gives attackers a richer attack surface.
  • Because Dawn bridges to the underlying OS/GPU drivers, bugs here can have far‑reaching effects if not tightly sandboxed.

Chrome mitigations still help

  • Site Isolation, sandboxing, and modern allocator protections reduce the blast radius.
  • Memory safety efforts (like MiraclePtr and PartitionAlloc hardening) raise exploit difficulty.
  • But if a zero‑day can achieve stable code execution in the renderer, attackers have a beachhead—and active exploitation proves at least some adversaries are getting traction.

How to verify your Chrome version (and push updates at scale)

  • Individuals:
  • Visit chrome://settings/help
  • Ensure it reads “Version 146.0.7680.178” or higher
  • Click “Relaunch”
  • Command line checks:
  • Windows (PowerShell): (Get-Item “C:\Program Files\Google\Chrome\Application\chrome.exe”).VersionInfo.FileVersion
  • macOS: /Applications/Google\ Chrome.app/Contents/MacOS/Google\ Chrome –version
  • Linux: google-chrome –version or chromium –version
  • Keep‑it‑simple fleet checks:
  • Use your RMM/MDM to query installed software versions and compare to the minimum required version.
  • Enforce the “MinimumVersionRequired” policy so outdated instances won’t start without updating.

Support articles: – How to update Chrome: Google Support: Update Google Chrome

Indicators of exploitation and threat‑hunting ideas

While zero‑days rarely leave a neat breadcrumb trail, here are practical areas to look:

  • Browser telemetry and EDR
  • Spike in GPU/renderer crashes originating from a small set of external URLs.
  • Chrome spawning unusual child processes or LOLBins (e.g., PowerShell, wscript) shortly after visiting graphics‑heavy pages.
  • New services, scheduled tasks, or persistence artifacts in the same timeframe as browser anomalies.
  • Network
  • Downloads of suspicious executables or archives following a visit to unknown content‑heavy sites.
  • Beaconing to newly registered domains after a browser crash/restart.
  • Application logs
  • If you have verbose logging enabled for testing, look for WebGPU initialization right before a crash or unusual GPU process behavior. Not all environments will have this.
  • User‑reported symptoms
  • “My browser crashed repeatedly on a certain site.”
  • “The page looked normal but my CPU/GPU spiked and then everything froze.”

Containment steps if you suspect exploitation: 1. Isolate the endpoint from the network. 2. Collect memory and disk images; preserve browser profiles for forensic review. 3. Reset browser state (profiles, cached data) after investigation; rotate credentials and tokens used in the session. 4. Rebuild or reimage if indicators suggest a sandbox escape or malware installation. 5. Patch to 146.0.7680.178+ before returning to service.

Timeline and sources

  • April 1, 2026: CISA adds CVE‑2026‑5281 to the KEV catalog, setting an April 15 patch deadline for FCEB agencies. Source: CISA KEV catalog.
  • Mid‑April 2026: Google ships Chrome updates addressing 21 vulnerabilities, including CVE‑2026‑5281. Source: Chrome Releases.
  • April 20, 2026: Public reporting highlights active exploitation and urgency to update. Source: The Hacker News.

Practical Q&A (FAQ)

Q: What exactly is CVE‑2026‑5281? A: It’s a high‑severity use‑after‑free vulnerability in Dawn, Chrome’s WebGPU implementation. Attackers can exploit it via a malicious webpage to run code in Chrome’s renderer process. It’s actively exploited in the wild.

Q: Which Chrome version fixes it? A: Version 146.0.7680.178 and later. Update and relaunch your browser.

Q: Am I affected on macOS or Linux? A: Yes, Chrome on macOS and Linux use Dawn and are impacted. Update to the fixed version on all desktop platforms.

Q: What about Android and iOS? A: Update Chrome on Android via the Play Store. On iOS, Chrome uses Apple’s WebKit engine (not Dawn), so this specific bug doesn’t apply the same way. Still, keep all browsers updated for other vulnerabilities.

Q: I use Edge/Brave/Opera—am I safe? A: Not necessarily. These browsers are based on Chromium. They typically adopt Google’s security fixes shortly after release. Check for and install updates immediately.

Q: How do I check my Chrome version? A: Go to chrome://settings/help (Menu → Help → About Google Chrome). Ensure it’s 146.0.7680.178 or later. Click “Relaunch.”

Q: Do I need to restart my browser after updating? A: Yes. The security fix isn’t active until you relaunch Chrome.

Q: Can antivirus/EDR block this attack? A: Maybe, but don’t rely on it. The best defense is patching. Some EDRs may catch post-exploitation behavior, but prevention via updating is your safest bet.

Q: Should I disable WebGPU? A: The recommended fix is to update. Disabling features via flags or policies is a temporary, environment‑specific workaround at best and may not fully mitigate risk. Update to the patched version.

Q: Why did CISA add it to KEV? A: CISA lists vulnerabilities with confirmed exploitation to drive urgent patching across federal agencies—and to signal to everyone else that attackers are actively using the bug.

Q: Could this lead to full system compromise? A: A renderer exploit alone is typically confined to the sandbox. But attackers often chain additional vulnerabilities (sandbox escapes) to reach the OS. Active exploitation means adversaries are attempting or achieving these chains, so patching is critical.

Final takeaway

Chrome’s CVE‑2026‑5281 is a real, in‑the‑wild zero‑day targeting WebGPU (Dawn). Update to 146.0.7680.178 or later and relaunch immediately—on every desktop where you use Chrome or other Chromium‑based browsers. Enterprises should enforce a minimum version, accelerate relaunch, and monitor for unusual WebGPU activity and post‑exploit signals. The fastest, safest, and most effective defense is patching now.

Discover more at InnoVirtuoso.com

I would love some feedback on my writing so if you have any, please don’t hesitate to leave a comment around here or in any platforms that is convenient for you.

For more on tech and other topics, explore InnoVirtuoso.com anytime. Subscribe to my newsletter and join our growing community—we’ll create something magical together. I promise, it’ll never be boring! 

Stay updated with the latest news—subscribe to our newsletter today!

Thank you all—wishing you an amazing day ahead!

Read more related Articles at InnoVirtuoso

Browse InnoVirtuoso for more!