Google has released an emergency security update for its Chrome browser to fix a high-severity vulnerability, CVE-2026-0628. The flaw exists in the WebView component and is caused by "insufficient policy enforcement." This could allow a malicious browser extension to bypass critical security restrictions designed to protect privileged browser pages. Successful exploitation could enable an attacker to steal data, hijack user sessions, or perform other malicious actions. The vulnerability affects Chrome on all major desktop platforms (Windows, macOS, and Linux). Google has not observed any active exploitation but strongly recommends all users update their browsers to version 143.0.7499.192/.193 or later to mitigate the risk.
CVE-2026-0628CVE-2026-0628 to inject malicious HTML or JavaScript into a privileged context, such as a settings page or another extension's page, which are normally sandboxed and protected.Exploitation Status: As of the announcement, Google has found no evidence that this vulnerability is being exploited in the wild.
Since this vulnerability requires a malicious extension, detection would focus on the delivery and behavior of such extensions.
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| other | Unsolicited or suspicious browser extension installation | A user being prompted to install a browser extension from an untrusted source or for a dubious purpose. | User awareness and endpoint monitoring. | high |
| process_name | Chrome extension process with anomalous network activity | A browser extension making unexpected network connections or communicating with known malicious domains. | EDR or host-based firewall logs. | medium |
chrome://settings/help.chrome://extensions/) and remove any that are unfamiliar, untrusted, or no longer needed. This reduces the overall attack surface.Update Google Chrome and other Chromium-based browsers to the latest version to remediate the vulnerability.
Mapped D3FEND Techniques:
In enterprise environments, restrict users from installing unauthorized browser extensions by using an allowlist policy.
Mapped D3FEND Techniques:
The immediate and most critical action is to ensure all instances of Google Chrome are updated across the user base. For individual users, this typically happens automatically, but they can force an update by going to 'Help' > 'About Google Chrome'. For enterprises, this vulnerability underscores the need for a centralized and aggressive patch management program for third-party applications, especially web browsers. System administrators should use tools like Microsoft Endpoint Manager (Intune), Jamf, or other configuration management platforms to push the update to all managed devices within 24-48 hours. This rapid deployment cycle is essential for browser vulnerabilities, as the time between disclosure and exploit development can be very short.
Since this attack requires a malicious extension, enterprises can proactively mitigate this and similar threats by implementing browser extension allowlisting. Using Google Workspace policies or other browser management tools, administrators should create a curated list of approved, business-justified extensions. All other extensions should be blocked by default ('*'). This prevents users from being tricked into installing a malicious extension that could exploit CVE-2026-0628 or future vulnerabilities. This approach significantly reduces the browser's attack surface and shifts the security model from reactive (detecting bad extensions) to proactive (only allowing known good ones).

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats