CVE-2026-7959 Overview
CVE-2026-7959 affects Google Chrome versions prior to 148.0.7778.96 across Windows, macOS, and Linux platforms. The vulnerability stems from an inappropriate implementation in the Navigation component. A remote attacker who has already compromised the renderer process can bypass site isolation by serving a crafted HTML page. Chromium classifies this issue as Medium severity, while NVD scores it as Low.
Site isolation is a Chrome security boundary that places content from different sites into separate operating system processes. Bypassing this boundary undermines a core defense-in-depth control against cross-site data theft and Spectre-class attacks.
Critical Impact
An attacker with renderer compromise can escape site isolation enforcement, exposing cross-origin content to a process they already control.
Affected Products
- Google Chrome prior to 148.0.7778.96 on Microsoft Windows
- Google Chrome prior to 148.0.7778.96 on Apple macOS
- Google Chrome prior to 148.0.7778.96 on Linux
Discovery Timeline
- 2026-05-06 - CVE-2026-7959 published to NVD
- 2026-05-07 - Last updated in NVD database
Technical Details for CVE-2026-7959
Vulnerability Analysis
The flaw lives in Chrome's Navigation logic, which decides how URLs, frames, and process assignments map to site instances. Site isolation relies on this code to keep cross-origin documents in distinct renderer processes. An inappropriate implementation in this path lets a crafted HTML page steer navigation in a way that violates the isolation invariant.
Exploitation is not trivial. The attack requires that the renderer process is already compromised and depends on user interaction with the crafted page. The Chromium project tracks the underlying defect in the Chromium Issue Tracker Entry.
Root Cause
The root cause is an implementation defect in how the Navigation component enforces site isolation policy decisions. The code fails to validate or maintain a security-relevant invariant during specific navigation flows. Because NVD assigns NVD-CWE-noinfo, the precise weakness class has not been publicly categorized.
Attack Vector
The attack chain assumes a prior renderer compromise, typically achieved by chaining a separate memory corruption or type confusion bug. From the compromised renderer, the attacker delivers a crafted HTML page that triggers the navigation path with the implementation flaw. The result is that content which should be isolated in a different process becomes accessible to the attacker-controlled renderer, defeating site isolation guarantees.
No public exploit code, proof-of-concept, or in-the-wild exploitation has been reported. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog.
Detection Methods for CVE-2026-7959
Indicators of Compromise
- Chrome browser processes running versions earlier than 148.0.7778.96 after the patch availability date.
- Unexpected child renderer processes spawning under chrome.exe with anomalous command-line flags or parent-child relationships.
- Outbound connections from renderer processes to attacker-controlled domains immediately after navigation events.
Detection Strategies
- Inventory installed Chrome versions across Windows, macOS, and Linux endpoints and flag any host below 148.0.7778.96.
- Correlate browser exploitation primitives, such as renderer crashes followed by sustained child process activity, which often precede sandbox or isolation bypass attempts.
- Hunt for HTML payloads served from low-reputation domains containing unusual frame, navigation, or window.open patterns.
Monitoring Recommendations
- Monitor enterprise browser telemetry and management policies for Chrome update compliance against the fixed build.
- Alert on renderer process integrity violations, including unexpected access to cross-origin storage or cookie scopes.
- Track DNS and proxy logs for users visiting newly registered or uncategorized domains hosting active web content.
How to Mitigate CVE-2026-7959
Immediate Actions Required
- Update Google Chrome to version 148.0.7778.96 or later on all Windows, macOS, and Linux endpoints.
- Force a browser restart through enterprise management to ensure the patched binary is active rather than queued.
- Validate that automatic update mechanisms, such as Google Update on Windows or the equivalent macOS and Linux channels, are functioning.
Patch Information
Google released the fix in the Stable Channel update documented in the Google Chrome Update Announcement. Chromium-based browsers that share the upstream Navigation code should adopt the corresponding merge once their vendors publish builds.
Workarounds
- Restrict browsing to trusted sites through enterprise web filtering until patching completes, since exploitation requires a crafted HTML page.
- Enforce browser policy to disable unnecessary content types and limit JavaScript execution on uncategorized domains.
- Require user interaction warnings on file downloads and external navigations to reduce the success rate of crafted-page delivery.
# Verify installed Chrome version on Linux
google-chrome --version
# Verify installed Chrome version on macOS
/Applications/Google\ Chrome.app/Contents/MacOS/Google\ Chrome --version
# Verify installed Chrome version on Windows (PowerShell)
(Get-Item "$env:ProgramFiles\Google\Chrome\Application\chrome.exe").VersionInfo.ProductVersion
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


