Chrome 147 Patches 60 Vulnerabilities

Chrome 147 just dropped, sealing 60 vulnerabilities — two critical ones in WebML that paid out $86,000 to bug hunters. But is this just whack-a-mole on a flawed architecture?

Chrome 147 Plugs 60 Holes — But WebML's Bleeding Won't Stop — theAIcatchup

Key Takeaways

  • Chrome 147 patches 60 vulnerabilities, including two critical WebML flaws worth $86K in bounties
  • New session cookie protections added to block stolen auth attacks
  • WebML's browser ML push creates persistent security risks, echoing early plugin woes

Chrome’s update balloon sneaks onto your screen during a late-night doomscroll — version 147, silently welding shut 60 vulnerabilities, two critical enough to earn their finders $43,000 apiece.

Chrome 147 patches hit like clockwork, but these aren’t your garden-variety glitches. Google dropped the stable release this week, targeting holes in the browser’s guts, especially WebML — that ambitious corner where machine learning models hum directly in your tabs.

What Makes WebML Such a Hacker Magnet?

Heap buffer overflow in CVE-2026-5858. Integer overflow in CVE-2026-5859. Sound like alphabet soup? They’re the critical duo, both clawing at WebML’s foundations. Anonymous researchers sniffed ‘em out, cashed $86,000 in bounties total — a payout screaming “sandbox escape potential” or worse, remote code execution right in your browser sandbox.

WebML promises on-device AI without phoning home to servers. Cool, right? Models crunching inferences client-side, speeding up everything from image recognition to real-time translation. But here’s the rub: cramming ML inference into browser sandboxes means exposing low-level memory ops to JavaScript’s wild frontier. One overflow, and boom — attackers pivot from tame web code to system-level chaos.

Google’s not spilling exploitation details (no in-the-wild reports, thankfully), but those severity scores and fat bounties? They’re neon signs. Compare this to Chrome’s V8 JavaScript engine, battle-hardened over years — WebML’s the green recruit, still learning to duck.

The critical vulnerabilities both impact Chrome’s WebML component, which is designed for running machine learning models directly in the browser.

That’s straight from Google’s advisory. Noble goal. Shaky execution so far.

High-Sevs and the Bounty Scraps

Fourteen highs sprinkled across WebRTC (video calls’ backbone), V8, WebAudio, Media, Angle graphics, Skia canvas rendering, Blink layout engine. Nearly half snagged internally by Google — good on them for self-auditing. But the external finds? Anonymously dropped, mostly no-pay, save two: $11K for CVE-2026-5860, $3K for CVE-2026-5861.

And don’t sleep on mediums. CVE-2026-5874, a use-after-free in PrivateAI (Google’s privacy-focused ML toolkit), bagged $11K. Use-after-free: classic memory haunt, where freed pointers get zombie-reanimated. In a browser? Recipe for injecting shellcode past defenses.

Look. Google’s bug program pays big for crits, peanuts for the rest. Signals what’s truly scary: WebML crits dwarf the pack. The rest? Hygiene fixes, keeping the lights on.

Why Chrome’s Patch Cadence Feels Like Whack-a-Mole

Patch 60 now, 21 in late March (including a zero-day under fire). Chrome 146 before that, highs galore. It’s relentless — browsers are the internet’s front door, 65% market share for Chrome.

But dig deeper. WebML’s rise ties to the browser ML shift — Wasm, TensorFlow.js, ONNX runtime. Architects bet on edge inference to dodge cloud latency and privacy pitfalls. Yet each layer (TFLite backend, WebGPU hooks) multiplies attack surface. Remember Flash? Plugin paradise turned exploit playground. WebML risks the same: hyped feature, under-secured.

My take — unique angle you won’t find in Google’s boilerplate: this mirrors early WebAssembly days. V8 team hardened it post-exploits; WebML’s prequel. Prediction? By 2026, we’ll see WebML zero-days in APT kits, unless Google pours V8-level scrutiny here. Their PR spins “proactive patching” — nah, it’s reactive firefighting on a architecture begging for sandbox rethink.

Cookie Protections: The Sneaky Win?

Tucked in the announcement: new session cookie defenses against stolen auth cookies. No vulns patched here — just hardening. Attackers snag cookies via XSS or malware, hijack sessions. Chrome now flags ‘em suspect, forces reauth.

Smart. But why bury it? Feels like PR chaff distracting from the 60-hole sieve. Still, if it thwarts account takeovers (think Gmail, YouTube empires), it’s a quiet hero.

Broader Ripple: Devs, Update Now

Angle, Skia fixes mean canvas exploits nerfed — goodbye, sneaky pixel-based RCE. WebRTC patches shore up peer-to-peer video leaks. Blink tweaks fend layout trigger bombs.

Developers: roll out Chrome 147 yesterday. Users: enable auto-updates (you do, right?). No exploited vulns reported, but crits like these lure script-kiddies fast.

And that March zero-day? Urgency reminder. Chrome’s fleet moves as one — delay, and you’re browse-bait.


🧬 Related Insights

Frequently Asked Questions

What vulnerabilities did Chrome 147 fix?

Sixty total: two critical WebML overflows (CVE-2026-5858, CVE-2026-5859), 14 highs across V8/WebRTC/etc., plus mediums like PrivateAI use-after-free.

Are there exploited Chrome 147 bugs?

No in-the-wild reports yet, unlike March’s zero-day — but crit bounties suggest prime targets.

Should I update to Chrome 147 now?

Yes, immediately — auto-update if possible; manual via chrome://settings/help.

Aisha Patel
Written by

Former ML engineer turned writer. Covers computer vision and robotics with a practitioner perspective.

Frequently asked questions

What vulnerabilities did Chrome 147 fix?
Sixty total: two critical WebML overflows (CVE-2026-5858, CVE-2026-5859), 14 highs across V8/WebRTC/etc., plus mediums like PrivateAI use-after-free.
Are there exploited Chrome 147 bugs?
No in-the-wild reports yet, unlike March's zero-day — but crit bounties suggest prime targets.
Should I update to Chrome 147 now?
Yes, immediately — auto-update if possible; manual via chrome://settings/help.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by SecurityWeek

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.