CVE-2026-7942 Overview
CVE-2026-7942 is an integer overflow vulnerability in ANGLE, the graphics abstraction layer used by Google Chrome to translate WebGL and OpenGL ES calls to native graphics APIs. The flaw affects Google Chrome versions prior to 148.0.7778.96 and allows a remote attacker to leak cross-origin data through a crafted HTML page. Google classifies the Chromium security severity as Medium. Successful exploitation requires user interaction, such as visiting an attacker-controlled web page. The weakness is tracked under CWE-472: External Control of Assumed-Immutable Web Parameter in the National Vulnerability Database entry.
Critical Impact
Remote attackers can leak cross-origin data from the browser by luring a user to a crafted HTML page that triggers the integer overflow in ANGLE.
Affected Products
- Google Chrome prior to 148.0.7778.96
- Chrome on Microsoft Windows
- Chrome on Apple macOS and Linux
Discovery Timeline
- 2026-05-06 - CVE-2026-7942 published to NVD
- 2026-05-06 - Last updated in NVD database
- 2026-05 - Google releases the fix in the Stable Channel update for desktop, documented in the Google Chrome Update Announcement
Technical Details for CVE-2026-7942
Vulnerability Analysis
ANGLE (Almost Native Graphics Layer Engine) translates WebGL and OpenGL ES API calls into Direct3D, Metal, or Vulkan calls depending on the host operating system. An integer overflow in this translation layer causes arithmetic on size or index values to wrap around an unintended boundary. The wrapped value is then used to compute buffer offsets or allocation sizes during graphics operations driven from JavaScript on a web page.
When the overflow occurs, ANGLE reads memory regions that fall outside the intended graphics resource. JavaScript running on an attacker-controlled origin can observe the resulting pixel or buffer data through standard WebGL readback APIs. This bypasses the same-origin policy and exposes data belonging to other origins loaded in the same renderer process.
The attack is network-reachable, requires no privileges, and only needs the victim to load a crafted HTML page. Impact is limited to confidentiality of cross-origin data; no integrity or availability impact is reported.
Root Cause
The root cause is unchecked arithmetic on integer values used to size or index graphics buffers inside ANGLE. Crafted WebGL parameters cause the calculation to overflow before bounds checks are applied, producing a smaller-than-expected allocation or an out-of-range offset that is later treated as valid.
Attack Vector
Exploitation proceeds in three steps. First, the attacker hosts an HTML page containing JavaScript that issues specific WebGL calls. Second, the victim visits the page, satisfying the user-interaction requirement. Third, the JavaScript reads back GPU buffer contents containing data sourced from another origin and exfiltrates it to the attacker.
No proof-of-concept exploit is published, and the issue is not listed in the CISA Known Exploited Vulnerabilities catalog. Technical details are tracked in the Chromium Issue Tracker Entry.
Detection Methods for CVE-2026-7942
Indicators of Compromise
- Chrome browser processes running versions earlier than 148.0.7778.96 after the patch release window.
- Outbound HTTP/HTTPS requests from renderer processes to unexpected domains immediately after WebGL-heavy page loads.
- Browser telemetry showing repeated WebGL context creation and readPixels calls from low-reputation origins.
Detection Strategies
- Inventory installed Chrome versions across managed endpoints and flag any build below 148.0.7778.96.
- Inspect web proxy logs for sessions to recently registered or low-reputation domains that serve WebGL-heavy content.
- Correlate browser process telemetry with DNS and HTTP egress to identify renderer processes exfiltrating data after visiting untrusted pages.
Monitoring Recommendations
- Enable enterprise browser reporting through Chrome Browser Cloud Management to receive version and extension inventory.
- Alert on Chrome installations that fall behind the current Stable Channel for more than the organization's defined patch window.
- Monitor for unusual outbound data volume from chrome.exe renderer child processes immediately following navigation events.
How to Mitigate CVE-2026-7942
Immediate Actions Required
- Update Google Chrome to version 148.0.7778.96 or later on all Windows, macOS, and Linux endpoints.
- Force a browser restart after the update so the patched ANGLE binary is loaded into memory.
- Verify the deployed version through chrome://settings/help or enterprise management tooling.
Patch Information
Google published the fix in the Stable Channel update for desktop. Administrators should consult the Google Chrome Update Announcement for the complete list of bug fixes included in the release. The fix is delivered through Chrome's standard automatic update mechanism on consumer installs and through enterprise update channels for managed deployments.
Workarounds
- Disable WebGL through enterprise policy by setting HardwareAccelerationModeEnabled to false until the patch is deployed.
- Restrict access to untrusted websites using URL allowlists or web filtering at the proxy layer.
- Apply the DefaultWebGLSetting policy to block WebGL on sites without explicit business need.
# Windows Group Policy registry example to disable hardware acceleration
reg add "HKLM\SOFTWARE\Policies\Google\Chrome" /v HardwareAccelerationModeEnabled /t REG_DWORD /d 0 /f
# Verify installed Chrome version on Linux
google-chrome --version
# Verify installed Chrome version on macOS
/Applications/Google\ Chrome.app/Contents/MacOS/Google\ Chrome --version
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


