Critical Chrome Proxy Bug Allows Sandbox Escape
The National Vulnerability Database has flagged a critical vulnerability, CVE-2026-6297, impacting Google Chrome versions prior to 147.0.7727.101. This use-after-free flaw, specifically within the browser’s proxy component, carries a CVSS score of 8.3 (HIGH) and is categorized under CWE-416.
According to the National Vulnerability Database, this vulnerability could enable an attacker in a privileged network position to achieve a sandbox escape. The attack vector leverages a specially crafted HTML page, meaning user interaction, typically clicking a malicious link, is a prerequisite. While the affected products aren’t explicitly detailed beyond ‘Google Chrome prior to 147.0.7727.101,’ the severity rating from Chromium security indicates a significant risk. A sandbox escape is a big deal; it means an attacker can break out of the browser’s protective container and potentially execute arbitrary code on the underlying system. This isn’t just about data theft; it’s about full system compromise.
Related ATT&CK Techniques
🛡️ Detection Rules
5 rules · 6 SIEM formats5 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, QRadar AQL, and Wazuh.
Web Application Exploitation Attempt — CVE-2026-6297
Want this in your SIEM's native format? Get Splunk SPL, Sentinel KQL, Elastic, QRadar AQL, or Wazuh — ready to paste.
5 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get All SIEM Formats →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6297 | Use After Free | Google Chrome < 147.0.7727.101 |
| CVE-2026-6297 | Sandbox Escape | Proxy component in Google Chrome |
| CVE-2026-6297 | Code Injection | crafted HTML page |