Vulnerability Description
Insufficient policy enforcement in DevTools in Google Chrome prior to 147.0.7727.55 allowed an attacker who convinced a user to install a malicious extension to bypass enterprise host restrictions for cookie modification via a crafted Chrome Extension. (Chromium security severity: Low)
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chrome | < 147.0.7727.55 | |
| Apple | Macos | - |
| Linux | Linux Kernel | - |
| Microsoft | Windows | - |
Related Weaknesses (CWE)
References
- https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.Release NotesVendor Advisory
- https://issues.chromium.org/issues/479673903Issue TrackingPermissions Required
FAQ
What is CVE-2026-5901?
CVE-2026-5901 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Insufficient policy enforcement in DevTools in Google Chrome prior to 147.0.7727.55 allowed an attacker who convinced a user to install a malicious extension to bypass enterprise host restrictions for...
How severe is CVE-2026-5901?
CVE-2026-5901 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5901?
Check the references section above for vendor advisories and patch information. Affected products include: Google Chrome, Apple Macos, Linux Linux Kernel, Microsoft Windows.