Sunday, April 5, 2026
ASX 200: 8,412 +0.43% | AUD/USD: 0.638 | RBA: 4.10% | BTC: $87.2K
← Back to home
Cybersecurity

Google Issues Zero-Day Alert For 3.5 Billion Chrome Users

Chrome 146.0.7680.177/178 fixes a WebGPU use-after-free in Dawn after Google confirmed exploitation in the wild.

6 min read
Editorial illustration of cracked Google Chrome logo
Generated with AI: Chrome browser security vulnerability illustration
Editor
Apr 4, 2026 · 6 min read
By Alex Mercer · 2026-04-04

Google pushed a Chrome security update on March 31 to fix CVE-2026-5281, a zero-day the company tied to active exploitation. Google shipped the fix in Chrome 146.0.7680.177/178 on Windows and macOS and 146.0.7680.177 on Linux.

TLDR

Google has patched CVE-2026-5281 in Chrome 146.0.7680.177/178 after confirming an exploit exists in the wild. The bug is a use-after-free in Dawn, Chrome's WebGPU implementation, and the release fixes 21 vulnerabilities in total. CISA added CVE-2026-5281 to its Known Exploited Vulnerabilities catalog on April 1 with an April 15 patch deadline for federal agencies.

KEY TAKEAWAYS

01CVE-2026-5281 affects Chrome before 146.0.7680.177/178 on Windows and macOS, and before 146.0.7680.177 on Linux.
02Google said CVE-2026-5281 is exploited in the wild, the fourth actively exploited Chrome zero-day of 2026.
03Google's March 31 desktop update fixes 21 vulnerabilities, including a use-after-free in Dawn (WebGPU).
04CISA added CVE-2026-5281 to the KEV catalog on April 1, 2026, with an April 15, 2026 deadline for US federal agencies.
05Chromium-based browsers listed as affected include Microsoft Edge, Vivaldi, Brave, and Opera, with Vivaldi listed as already patched.
Google is aware that an exploit for CVE-2026-5281 exists in the wild.

— Google security advisory

Google described CVE-2026-5281 as a "use-after-free (UAF) in Dawn", the WebGPU implementation used by Chromium. Google said the desktop update includes "21" security fixes, with most entries listed as routine memory safety bugs and sandbox hardening work.

What Google lists as affected

Chrome versions "before v146.0.7680.177/178" on Windows and macOS are listed as affected in Google's post. Chrome versions "before v146.0.7680.177" on Linux are also listed as affected.

Google listed the fixed builds as "146.0.7680.177/178". Google also warned that "access to bug details and links may be kept restricted until a majority of users are updated with a fix".

Access to bug details and links may be kept restricted until a majority of users are updated with a fix.

— Google security advisory

What CVE-2026-5281 does

Google's release note describes the exploitation path in one line. A "remote attacker who compromised the renderer process can execute arbitrary code via a crafted HTML page", the brief said.

MITRE tracks the bug class as CWE-416, "Use After Free". MITRE describes the category as code continuing to access memory after it has been freed.

Dawn is Google's open-source WebGPU implementation. WebGPU is the browser API that exposes modern graphics and compute features to web content, and Dawn sits between the web-facing API and the lower-level GPU backends that differ across Windows, macOS and Linux.

Why Dawn sits on the hot path

Dawn is not a user-facing product name, and it shows up in advisories when the vulnerability lives below the Chrome UI layer. Dawn is the code that translates a website's WebGPU calls into driver-facing work across different platforms, and the brief ties CVE-2026-5281 to that translation layer rather than to a single web feature toggle.

Google also used the same precondition language seen in other Chrome advisories in 2026. Google framed the attacker model as a renderer compromise and the impact as "execute arbitrary code" via "crafted HTML", and the brief repeats that phrasing when describing CVE-2026-5281.

Government advisories and deadlines

CISA added CVE-2026-5281 to its Known Exploited Vulnerabilities catalog on April 1, 2026. CISA listed an "April 15, 2026" patch deadline for US federal agencies.

Singapore's Cyber Security Agency also issued guidance. Singapore CSA listed the issue in advisory "AL-2026-029" and referenced the same Chrome 146 stable update.

Chromium browsers beyond Chrome

Chromium is the shared codebase for a long list of browsers, and the brief lists "all Chromium-based browsers" as affected. Microsoft Edge, Vivaldi, Brave and Opera are named in the brief as impacted browsers that track Chromium releases.

Vivaldi is "already patched", the brief said. Microsoft is "working on" an Edge fix, according to the same brief.

A familiar reporter hash

Google credited the report to a pseudonymous researcher listed as "86ac1f1587b71893ed2ad792cd7dde32". The brief ties the same handle to earlier Chrome disclosures, including CVE-2026-4675 and CVE-2026-4676.

Four actively exploited zero-days in 2026

CVE-2026-5281 is the "fourth actively exploited Chrome zero-day in 2026", the brief said. CVE-2026-2441 landed in February as a CSS use-after-free, and March added CVE-2026-3909, an out-of-bounds write in Skia, and CVE-2026-3910, an inappropriate implementation in V8.

Google fixed "8" Chrome zero-days across 2025, the brief said. Google also has a larger installed base than most security advisories assume, with the brief citing "3.5 billion" Chrome users.

What security teams are checking

Chrome version strings are the first check in most enterprise dashboards after an active exploitation advisory. Windows and macOS fleets are looking for 146.0.7680.177 or 146.0.7680.178, and Linux fleets are looking for 146.0.7680.177.

CISA KEV entries add a second clock for many organisations that track the catalog as a control list. April 15, 2026 is the listed deadline, and that date often becomes the internal milestone for patch validation, exception handling, and reporting.

Google framed the exploit precondition as a compromised renderer process. Google also paired that precondition with the same outcome language used in the brief, "execute arbitrary code" via a crafted web page, and that is the standard red flag line for browser incident response teams.

What the advisory does not include

Google did not name a target set, a campaign name, or an attacker group in the March 31 post. Google stayed at the level of the CVE identifier, the component name, and the statement that an exploit exists in the wild.

Dawn is the only component called out by name for CVE-2026-5281, and the brief labels the severity as "High" with "CVSS score not yet assigned". CISA and Singapore CSA entries point readers back to the same stable channel builds and the same restriction note from Google's advisory.

FREQUENTLY ASKED QUESTIONS

What is CVE-2026-5281?
CVE-2026-5281 is a Chrome zero-day described as a use-after-free (CWE-416) in Dawn, Google's open-source WebGPU implementation.
Which Chrome versions are patched for CVE-2026-5281?
Google shipped fixes in Chrome 146.0.7680.177/178 for Windows and macOS, and 146.0.7680.177 for Linux.
Are other Chromium browsers affected by CVE-2026-5281?
The brief lists all Chromium-based browsers as affected, including Microsoft Edge, Vivaldi, Brave, and Opera.
When did CISA add CVE-2026-5281 to the KEV catalog?
CISA added CVE-2026-5281 on April 1, 2026, and set an April 15, 2026 deadline for US federal agencies.
What is Dawn in Chrome?
Dawn is Google's open-source implementation of the WebGPU standard that ships with Chromium and Chromium-based browsers.
Editor

Editor

The Bushletter editorial team. Independent business journalism covering markets, technology, policy, and culture.

The Morning Brief

Business news that matters. Five stories, five minutes, delivered every weekday. Trusted by professionals who need clarity before the market opens.

Free. No spam. Unsubscribe anytime.