Home OSINT News Signals
CYBER

Google Patches Actively Exploited Chrome Zero-Day CVE-2026-5281 in Dawn WebGPU Component

🕓 2 min read

Google has urgently released a security update for its Chrome browser, addressing a total of 21 vulnerabilities. Among these is a critical zero-day flaw, tracked as CVE-2026-5281, which is already being actively exploited by attackers in the wild. The high-severity vulnerability is a use-after-free memory corruption bug within Dawn, an open-source, cross-platform implementation of the WebGPU standard that provides low-level, high-performance graphics and compute access within the browser. Use-after-free flaws occur when a program continues to use a pointer to a memory location after it has been freed, which can lead to crashes, data corruption, or, crucially, allow an attacker to execute arbitrary code on the target system. Google's Threat Analysis Group (TAG) confirmed the active exploitation, prompting the out-of-band patch release.

The exploitation of CVE-2026-5281 represents a significant threat, as successful attacks can lead to full system compromise. An attacker could craft a malicious webpage that, when visited by a user with an unpatched version of Chrome, triggers the vulnerability. This could allow the attacker to escape the browser's security sandbox, execute code on the underlying operating system, and potentially install malware, steal sensitive data, or establish persistence on the victim's machine. The targeting of Dawn, a core component for next-generation web graphics, suggests attackers are probing newer, complex browser subsystems that may have received less security scrutiny than long-established components like the V8 JavaScript engine.

In response to the active threat, Google has rolled out version 130.0.6723.116/.117 for Windows and macOS, and version 130.0.6723.116 for Linux. The update is being distributed via the browser's built-in update mechanism. Users are strongly advised to restart their browser immediately to apply the patch. Enterprise administrators should ensure the update is deployed across their managed environments without delay. This marks the second Chrome zero-day patched this year, following CVE-2026-4910 in January, highlighting a continued trend of sophisticated actors targeting browser vulnerabilities for initial access in broader attack chains.

Beyond the zero-day, the stable channel update fixes 20 other security issues from internal audits and external contributions. Google maintains its standard policy of restricting details about the other vulnerabilities until a majority of users have updated, to prevent further exploitation. This incident underscores the critical importance of prompt software updates in cybersecurity hygiene. For organizations, it reinforces the need for robust patch management strategies and defense-in-depth approaches, including network segmentation and endpoint detection, to mitigate risks when zero-day exploits emerge before patches are available.

Telegram X LinkedIn
Back to News