March 02, 2026 Source: The Hacker News 3 min read · 653 words

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

Нова вразливість Chrome дозволяє шкідливим розширенням підвищити привілеї через панель Gemini

Chrome's Nasty Little Secret: How Malicious Extensions Just Walked Through Your Front Door

A CVSS score of 8.8. That's how Google rated the Chrome vulnerability it just patched in January 2026, and frankly, that number doesn't fully capture how genuinely unsettling this one is.

According to The Hacker News, CVE-2026-0628 gave malicious extensions the ability to escalate their privileges and access files on your local system—all because Google's policy enforcement in the WebView tag had a hole you could drive a truck through.

Think of it this way: you installed what looked like a legitimate extension from the Chrome Web Store, and it was basically handed a skeleton key to your machine. That's the scale we're talking about.

Breaking It Down

Here's what makes this vulnerability particularly nasty. Extensions in Chrome operate in a sandboxed environment with specific permissions that users explicitly grant. That's the whole deal—you authorize them to do certain things, and they're supposed to stay in their lane. But CVE-2026-0628 threw that safeguard out the window.

The vulnerability lived in the WebView tag, which is essentially Chrome's mechanism for displaying web content within an extension's context. Insufficient policy enforcement there meant an attacker could weaponize this component to break free from the normal permission restrictions.

And then it got worse.

Once a malicious extension exploited this flaw, it wasn't just accessing random data—it was gaining the ability to read local files that should've been off-limits. We're talking about your downloads folder, your documents, potentially even sensitive configuration files. The privilege escalation was real.

So why does this matter so much? Because millions of people trust the Chrome Web Store. They install extensions for productivity, privacy, ad-blocking, whatever. They assume Google's vetting process actually catches the bad actors.

The Technical Side

For those who want the technical details: the vulnerability centered on how the WebView tag enforces content security policies and extension permissions. Normally, there's a clear boundary between what an extension can access and what's restricted based on user permissions and Chrome's security model.

A malicious actor could craft an extension that appears benign during the initial review, then uses the WebView vulnerability to escalate privileges at runtime. Once that happens, the permission sandbox collapses. Local file access becomes trivial.

The fix involved tightening policy enforcement to ensure WebView respects the extension permission model. Google patched this across Chrome versions in January 2026, but there's a window of time where vulnerable versions remain in the wild.

Who's Affected

Technically? Anyone running an unpatched version of Chrome who installed a malicious extension. But here's the brutal part—you might not even know you installed one. Scammers are excellent at camouflaging malware as legitimate tools.

The real question is whether any of these malicious extensions actually made it onto the Chrome Web Store before Google caught them. The security news coverage doesn't confirm active exploitation in the wild, which is either reassuring or suspicious depending on how paranoid you're feeling today.

What To Do Now

First: update Chrome immediately if you haven't already. Go to Settings > About Chrome and let it force-update if needed. Don't assume automatic updates caught this one.

Second: audit your extensions ruthlessly. Go through every single one. Does that password manager extension you installed three years ago still have 50 user reviews? Is that translator tool actually from a legitimate developer? If you can't justify why it's there, remove it.

Third: consider whether you even need browser extensions for what you're doing. I know that's inconvenient, but an extension is literally code running in your browser with access to everything you do online. The attack surface is massive.

Last point: this vulnerability sat in Chrome's codebase long enough that someone found it, weaponized it, and Google had to issue a patch with an 8.8 severity rating. That's a failure in the development process that goes beyond this single CVE. Watch for follow-ups on what else might've slipped through.

Read original article →

// FAQ

What is CVE-2026-0628 and how severe is it?

CVE-2026-0628 is a Chrome vulnerability with a CVSS score of 8.8 (high severity) that allowed malicious extensions to escalate privileges and access local files through insufficient policy enforcement in the WebView tag. Google patched it in January 2026.

How can a malicious Chrome extension exploit this vulnerability?

A malicious extension could exploit weak policy enforcement in the WebView tag to break out of the normal permission sandbox, escalate its privileges, and access files on your local system that should be restricted.

What should I do if I'm worried about this Chrome vulnerability?

Update Chrome to the latest version immediately, then review and remove any unfamiliar or unnecessary extensions from your browser. Only keep extensions from developers you trust.

Concerned about your project's security? Run an automated pentest with AISEC — fully automated AI-powered scanner. Go to dashboard →