Comprehensive Threat Exposure Management Platform
Google has rushed out emergency fixes for CVE-2026-5281, a Chrome zero-day already being exploited in the wild, rooted in a use-after-free flaw within the WebGPU-powered Dawn component. By mishandling memory during GPU operations, the CVE-2026-5281 bug leaves behind dangling pointers that attackers can abuse to execute arbitrary code. With active exploitation of CVE-2026-5281 confirmed since March 10, 2026, updating Chrome immediately is critical to staying protected. CVE-2026-5281 affects Google Chrome versions before 146.0.7680.178 on Windows and macOS, and 146.0.7680.177 on Linux, as well as other Chromium-based browsers that include the vulnerable Dawn component. CVE-2026-5281 has been added to CISA KEV catalog.
Google released emergency updates to fix another Chrome zero-day vulnerability exploited in attacks, tracked as CVE-2026-5281. This CVE-2026-5281 flaw is a use-after-free (UAF) issue (CWE-416) in the Dawn component, which powers Chrome’s implementation of the WebGPU API. Designed to enable high-performance GPU access from within the browser, WebGPU introduces complex memory interactions, making CVE-2026-5281 flaws like this particularly dangerous when memory is accessed after being freed.
The CVE-2026-5281 vulnerability stems from improper memory lifecycle handling within Dawn during WebGPU operations. Certain GPU resources, once released, can still be referenced through lingering pointers. An attacker who has already gained a foothold in the Chrome renderer process can exploit this CVE-2026-5281 condition using a specially crafted web page with malicious WebGPU calls, ultimately triggering access to freed memory and achieving arbitrary code execution.
The attack vector for CVE-2026-5281 vulnerability is network-based, requiring user interaction; specifically, the victim must navigate to or be redirected to a malicious web page. However, because CVE-2026-5281 exploitation requires prior compromise of the renderer process, this vulnerability is most likely used as part of a multi-stage exploit chain, where an initial vulnerability is used to compromise the renderer sandbox before CVE-2026-5281 is leveraged for sandbox escape or privilege escalation to achieve full code execution on the host system.
The CVE-2026-5281 issue affects Chrome versions before 146.0.7680.178 on Windows and macOS, and 146.0.7680.177 on Linux, as well as other Chromium-based browsers that include the vulnerable Dawn component. With active exploitation of CVE-2026-5281 confirmed since March 10, 2026, users and organizations should immediately update to the latest Chrome version to reduce exposure and prevent potential attacks targeting the WebGPU Dawn component.
All users and organizations should update Google Chrome to version 146.0.7680.177/178 for Windows and macOS, or 146.0.7680.177 for Linux without delay. This patch resolves the CVE-2026-5281 use-after-free vulnerability in Dawn that is under active exploitation. To update, navigate to More > Help > About Google Chrome and allow the browser to download and install the latest version, then relaunch the browser to complete the CVE-2026-5281 update process.
Users of other Chromium-based browsers, including Microsoft Edge, Brave, Opera, and Vivaldi, should monitor their respective vendors for security updates addressing the same underlying CVE-2026-5281 vulnerability and apply patches as soon as they become available. These browsers share the Chromium engine and are equally susceptible to CVE-2026-5281 if running unpatched versions.
Ensure that automatic update mechanisms are enabled for all browsers deployed across the organization. This minimizes the window of exposure between CVE-2026-5281 vulnerability disclosure and patch application and reduces reliance on manual intervention for critical security updates.
Maintain a comprehensive vulnerability management program that includes regular scanning, patch prioritization based on CISA KEV listings and active exploitation status, and a defined SLA for critical patch deployment. Maintain an inventory of all browser versions deployed across the enterprise and establish processes for rapid response when zero-day vulnerabilities like CVE-2026-5281 are disclosed.
Initial Access:
Execution:
Privilege Escalation:
Resource Development:
Get through updates and upcoming events, and more directly in your inbox