Skip to main content
Security 2 min read 254 views

Google Patches First Actively Exploited Chrome Zero-Day of 2026

Google patches CVE-2026-2441, a high-severity use-after-free vulnerability in Chrome's CSS component that requires nothing more than visiting a malicious webpage to exploit, affecting over 3 billion Chrome users.

TD

TechDrop Editorial

Share:

Google released an emergency update for Chrome on February 13, 2026, patching CVE-2026-2441, a high-severity use-after-free vulnerability actively exploited in the wild. It is the first actively exploited Chrome zero-day of 2026.

The Vulnerability

CVE-2026-2441 is a use-after-free flaw in CSSFontFeatureValuesMap, a component of Chrome's CSS implementation that handles font feature value processing. Use-after-free vulnerabilities occur when a program references memory after it has been freed, potentially allowing an attacker to control that memory location and redirect execution. The vulnerability carries a CVSS score of 8.8 (High severity) and was reported by security researcher Shaheen Fazim on February 11.

The attack vector is particularly concerning: exploitation requires only visiting a specially crafted webpage. No file download, no permission grant, no interaction beyond navigating to the URL. Drive-by exploitation via malicious ads, compromised legitimate sites, or phishing links are all viable delivery mechanisms.

Patch Details

Google shipped the fix in Chrome 145.0.7632.75/76 for Windows and macOS, and Chrome 144.0.7559.75 for Linux. Chrome's auto-update mechanism delivers patches silently, but the update requires a browser restart. Users who keep Chrome windows open indefinitely may remain on a vulnerable version despite the update being downloaded.

Downstream Chromium-based browsers — Opera, Vivaldi, and Microsoft Edge — share the affected CSS code and are also vulnerable. Their vendors ship patches based on the upstream Chromium fix on their own timelines.

Scale of Impact

With over 3 billion Chrome users worldwide, even a low exploitation success rate translates to a large number of potential victims. Use-after-free vulnerabilities in browser components are among the most reliable primitives for achieving remote code execution in the browser process. In modern browser security, achieving full system compromise typically requires chaining a renderer exploit with a sandbox escape — whether CVE-2026-2441 has been observed in such a chain has not been confirmed.

Users should verify their Chrome version via the Help menu and confirm they are running 145.0.7632.75 or later on Windows/macOS, or 144.0.7559.75 or later on Linux.

Related Articles