CVE-2026-5281 — Google Dawn: Google Dawn Use-After-Free Vulnerability
CVE-2026-5281 — Google Dawn contains an use-after-free vulnerability that could allow a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. This vulnerability could affect multiple Chromium-based products including, but not limited to, Google C
What This Means For You
- CISA has confirmed active exploitation — immediate patching required.
- Added to CISA KEV catalog — federal agencies must remediate by 2026-04-15.
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-5281 | Use After Free | Google Dawn, use-after-free vulnerability, affects multiple Chromium-based products (Google Chrome, Microsoft Edge, Opera), allows remote code execution via crafted HTML page. |
| CVE-2026-5281 | RCE | Google Dawn, use-after-free vulnerability, allows remote code execution via crafted HTML page in compromised renderer process. |
| CVE-2026-5281 | Affected Software | Google Dawn, Google Chrome, Microsoft Edge, Opera |
🔎
Turn this CVE into SIEM detection coverage
Generate detection rules for Splunk, Sentinel, QRadar & Elastic — straight from this vulnerability. Use /detect in the Intel Bot.
Open Intel Bot →
Source & Attribution
| Source Platform | CISA |
| Channel | CISA KEV |
| Published | April 01, 2026 at 15:00 UTC |
This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.
Believe this infringes your rights? Submit a takedown request.