Chrome 146 security update fixes 29 vulnerabilities, including a critical WebML flaw


Google has released Chrome 146 to the stable channel for Windows, Mac, and Linux, and the update includes 29 security fixes. The patched versions are Chrome 146.0.7680.71 for Linux and Chrome 146.0.7680.71/72 for Windows and Mac, with the rollout happening over the coming days and weeks.

The most serious issue fixed in this release is CVE-2026-3913, a critical heap buffer overflow in WebML. Google’s bulletin says researcher Tobias Wienand reported the flaw on February 10, 2026, and received a $33,000 reward.

For users, the key takeaway is simple. Update Chrome now. Google has not said these bugs were exploited in the wild, but several of the patched flaws are memory corruption issues that can become serious security risks if attackers weaponize them. Google also said it is restricting bug details until more users install the fix.

What Google patched

Google’s March 10 bulletin lists 29 security fixes across multiple Chrome components. The highest-profile bugs in this release affect WebML, but the update also addresses flaws in Web Speech, Agents, WebMCP, Extensions, TextEncoding, MediaStream, WebMIDI, WindowDialog, V8, PDF, ChromeDriver, DevTools, and other areas.

Several of the high-severity flaws involve use-after-free bugs, which attackers often target because they can lead to crashes, memory corruption, and in some cases arbitrary code execution. The update also fixes out-of-bounds reads, incorrect security UI issues, unsafe navigation, side-channel leakage, and policy enforcement weaknesses.

Google awarded significant bug bounties for some of these discoveries. The company said CVE-2026-3914 and CVE-2026-3915 each earned $43,000, while CVE-2026-3916 earned $36,000.

Highest-severity vulnerabilities in Chrome 146

CVESeverityComponentIssue type
CVE-2026-3913CriticalWebMLHeap buffer overflow
CVE-2026-3914HighWebMLInteger overflow
CVE-2026-3915HighWebMLHeap buffer overflow
CVE-2026-3916HighWeb SpeechOut-of-bounds read
CVE-2026-3917HighAgentsUse-after-free
CVE-2026-3918HighWebMCPUse-after-free
CVE-2026-3919HighExtensionsUse-after-free
CVE-2026-3920HighWebMLOut-of-bounds memory access

Source: Google Chrome Releases bulletin.

Why this update matters

Browsers remain one of the most exposed pieces of software on any PC because they process untrusted web content all day. A flaw in a browser engine or web-facing component can give attackers a path to crash the browser, escape security boundaries, or run unwanted code after a victim opens a malicious page. That is why Chrome security updates matter even when Google has not reported active exploitation.

This release also stands out because WebML appears several times in the high-severity list. That does not mean the feature is under active attack, but it does show where security researchers focused attention during this cycle.

What users should do now

  • Open Chrome
  • Click the three-dot menu
  • Go to <strong>Help</strong>
  • Click <strong>About Google Chrome</strong>
  • Let Chrome download the update
  • Restart the browser to apply the patch

Google says the stable rollout will continue over the coming days and weeks, so some systems may receive it slightly later than others.

Version details

PlatformUpdated stable version
Linux146.0.7680.71
Windows146.0.7680.71/72
Mac146.0.7680.71/72

Source: Google Chrome Releases.

FAQ

What does the Chrome 146 update fix?

It fixes 29 security vulnerabilities, including one critical flaw and multiple high-severity bugs.

What is the most serious bug in this update?

Google lists CVE-2026-3913, a critical heap buffer overflow in WebML, as the top issue in this release.

Has Google said these flaws are being exploited?

The March 10 desktop bulletin does not say they are under active exploitation. It says bug details may stay restricted until more users update.

How do I install the fix?

Go to Help, then About Google Chrome, and restart the browser after the update downloads.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages