CVE-2026-2441

HIGH
2026-02-13 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
Patch Released
Apr 09, 2026 - 20:30 nvd
Patch available
Analysis Generated
Mar 12, 2026 - 22:02 vuln.today
Added to CISA KEV
Feb 23, 2026 - 13:24 cisa
CISA KEV
PoC Detected
Feb 23, 2026 - 13:24 vuln.today
Public exploit code
CVE Published
Feb 13, 2026 - 19:17 nvd
HIGH 8.8

Description

Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

Analysis

Google Chrome's CSS engine contains a use-after-free vulnerability (CVE-2026-2441, CVSS 8.8) that allows remote attackers to execute arbitrary code within the browser sandbox through crafted HTML pages. KEV-listed with public PoC, this vulnerability enables drive-by exploitation when users visit malicious or compromised websites.

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Assess Chrome deployment across the organization and identify business-critical systems using vulnerable versions; communicate the threat to all users and restrict Chrome access to non-sensitive tasks where possible. Within 7 days: Implement browser isolation technologies or sandboxed browsing environments for high-risk users; enforce strict web filtering to block known malicious domains; consider deploying alternative browsers for critical workflows. …

Sign in for detailed remediation steps.

Priority Score

114
Low Medium High Critical
KEV: +50
EPSS: +0.1
CVSS: +44
POC: +20

Vendor Status

Share

CVE-2026-2441 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy