PoC Released for Critical Chrome CVE-2026-2441 Zero-Day Exploited in the Wild


A public proof-of-concept exploit targets CVE-2026-2441, a critical use-after-free zero-day in Chrome’s Blink CSS engine. Google confirms active in-the-wild exploitation. Security researcher Shaheen Fazim reported it on February 11, 2026. Google patched two days later in emergency versions.

The flaw lives in CSSFontFeatureValuesMap. An iterator holds a raw pointer to FontFeatureAliases HashMap. Mutations during iteration trigger rehashing. This frees old memory while the pointer dangles. FetchNextItem reads freed heap, causing crashes or code execution.

Chrome’s first 2026 zero-day affects renderer process. Sandbox limits damage initially. Attackers chain it for escapes. PoC shows three trigger paths. Heap grooming with @font-feature-values rules aids reliability.

Affected Versions Table

PlatformVulnerable VersionsFixed Versions
Windows/macOS Stable< 145.0.7632.75≥ 145.0.7632.75
Linux Stable< 144.0.7559.75≥ 144.0.7559.75
Extended Stable< 144.0.7559.177≥ 144.0.7559.177
Chromium-basedVendor-specificCheck vendor patches

Update via chrome://settings/help immediately.

PoC Trigger Methods

MethodTechnique
entries() IteratorMutation loop during iteration
for…of LoopConcurrent delete + heap spray
requestAnimationFrameLayout recalc mid-iteration

50 @font-feature-values rules groom heap layout.

Technical Root Cause

FontFeatureValuesMapIterationSource stores raw pointer aliases_.
set() or delete() calls HashMap::rehash().
Old storage frees. Iterator uses stale pointer.
FetchNextItem() triggers UAF on Windows STATUS_ACCESS_VIOLATION.

Google fix: Deep copy HashMap for iterator isolation.

Impact Breakdown

Renderer sandbox confines effects:

  • Arbitrary read/write in sandbox.
  • V8 heap leaks bypass ASLR.
  • Steal document.cookie, localStorage.
  • Session tokens via IndexedDB.

Chains to full compromise like Pegasus WebKit attacks.

Delivery Vectors

No user interaction beyond page visit:

  • Malvertising on legit sites.
  • Watering hole compromises.
  • Spear-phishing HTML attachments.
  • Compromised WordPress plugins.

Detection Signatures

Monitor renderer crashes:

  • SIGSEGV in Blink CSS parsing.
  • High CSS @font-feature-values rule counts.
  • Heap allocation spikes during layout.

Chrome status: chrome://crashes shows UAF patterns.

Patch Verification Steps

  • Navigate chrome://settings/help.
  • Confirm version ≥ 145.0.7632.75 (Win/macOS).
  • Enable Site Isolation: chrome://flags/#site-isolation-trial-opt-out.
  • Test PoC page crashes on fixed builds.

Enterprise: Deploy WSUS/GPO for auto-updates.

Risk by Browser Family

BrowserRisk LevelPatch Status
ChromeHighAvailable
EdgeHighCheck Microsoft
BraveHighAvailable
Opera/VivaldiHighVendor patches

3 billion+ users affected potentially.

FAQ

What causes CVE-2026-2441 UAF in Chrome Blink?

Iterator raw pointer dangles after HashMap rehash during mutation.

Which Chrome versions fix the zero-day?

145.0.7632.75+ (Win/macOS), 144.0.7559.75+ (Linux).

Is CVE-2026-2441 exploited in attacks?

Yes, Google confirms active wild exploitation.

Does sandbox stop full compromise?

Contains renderer RCE. Chains needed for escape.

Where is the public PoC code?

GitHub demonstrates safe crash reproduction.

Did CISA mandate federal patching?

Added to KEV catalog requiring immediate action.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages