LIVE NEWS
  • Scientists uncover cancer-causing chemicals hidden in everyday foods
  • Ebola risk raised to 'very high' in DR Congo
  • Crypto Is Growing Up—Why Some Everyday Traders Are Moving On
  • Fake Gemini and Claude Code Sites Spread Infostealers
  • AI Helps Solo Business Owners Make Smarter Inventory Decisions
  • Rubio looks increasingly plausible for the 2028 presidential election
  • Gold holds within weekly range as US-Iran talks remain in focus
  • KC-135 Pulled from Boneyard Weeks After Another Crashed in Iraq
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Google accidentally exposed details of unfixed Chromium flaw
Cybersecurity

Google accidentally exposed details of unfixed Chromium flaw

primereportsBy primereportsMay 21, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Google accidentally exposed details of unfixed Chromium flaw
Share
Facebook Twitter LinkedIn Pinterest Email


Google accidentally exposed details of unfixed Chromium flaw

Google has accidentally leaked details about an unfixed issue in Chromium that keeps JavaScript running in the background even when the browser is closed, allowing remote code execution on the device.

The flaw was reported by security researcher Lyra Rebane and acknowledged as valid in December 2022, as per the thread on Chromium Issue Tracker.

An attacker could exploit the problem to create a malicious webpage with a Service Worker, such as a download task, that never terminates. Rebane says that this could allow an attacker to execute JavaScript code on the visitors’ devices.

“It’s realistic to get tens of thousands of pageviews for creating a ‘botnet’, and people won’t be aware that JavaScript can be remotely executed on their device,” Rebane says in the original bug report.

Potential exploitation scenarios include using compromised browsers to launch distributed denial-of-service (DDoS) attacks, proxying malicious traffic, and arbitrarily redirecting traffic to target sites.

The issue impacts all Chromium-based browsers, including Google Chrome, Microsoft Edge, Brave, Opera, Vivaldi, and Arc.

Persistent bug

On October 26, 2024, a Google developer noticed that the issue was still open and described it as a “serious vulnerability” that needed a status update “to ensure that there’s progress.”

This year, on February 10, the issue was marked as fixed and reopened just a few minutes later due to several concerns.

Since it was a security problem, the labels for the bug were updated so it could go through the Chrome Vulnerability Rewards Program (VRP) Panel, and the issue was marked as fixed on February 12, although a patch had not been shipped.

An automated email informed Rebane that she had been awarded a bug bounty of $1,000.

All access restrictions on Chromium Issue Tracker were removed on May 20, since the bug had been closed for more than 14 weeks and marked as fixed in the system.

On the same day, Rebane tested the fix and noticed that the problem was still present in Chrome Dev 150 and Edge 148.

“Back in 2022, I found a bug that would let me, with no user interaction, turn any Chromium-based browser into a permanent JS botnet member,” the researcher said in a post yesterday.

“In Edge, you wouldn’t even notice anything out of place, and would stay connected to the C2 even after closing the browser.”

After noticing that the exploit still worked, the researcher realized that Google had likely published the details by mistake.

To make matters worse, the download pop up that appeared when triggering the exploit previously no longer comes up in the latest Edge, making the exploit even stealthier.

“OH NO I JUST REALIZED THIS IS NOT ACTUALLY PROPERLY FIXED AND STILL WORKS,” posted Rebane on Mastodon.

“Even worse, Edge no longer even makes the download menu pop up, so it’s completely silent JS RCE that keeps running even after you close the browser !! all from just visiting a single website once !!”

Although the issue was made private again, the exposure lasted long enough for the information to leak.

Rebane told Ars Technica that Google’s exposure would make exploitation “pretty easy,” however, scaling it into a large botnet is more complicated.

She also clarified that the bug does not bypass browser security boundaries and doesn’t give attackers access to the victim’s emails, files, or the host OS.

Given that the issue details have been leaked, the risk to a large number of users is significant, and Google will most likely treat this as urgent, releasing emergency fixes soon.

BleepingComputer has reached out to Google for a comment on this exposure, but we have not received a response by publication.


article image

Automated pentesting tools deliver real value, but they were built to answer one question: can an attacker move through the network? They were not built to test whether your controls block threats, your detection rules fire, or your cloud configs hold.

This guide covers the 6 surfaces you actually need to validate.

Download Now

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSpaceX, OpenAI valuations to leapfrog Berkshire Hathaway, traders say
Next Article AAVE Price Prediction: $75 Target Looms as DeFi Giant Bleeds Below Critical Support
primereports
  • Website

Related Posts

Cybersecurity

Fake Gemini and Claude Code Sites Spread Infostealers

May 22, 2026
Cybersecurity

Thinking about plug-in solar? It may be coming to your state soon

May 22, 2026
Cybersecurity

Infosecurity Europe

May 21, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20265 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Scientists uncover cancer-causing chemicals hidden in everyday foods
  • Ebola risk raised to 'very high' in DR Congo
  • Crypto Is Growing Up—Why Some Everyday Traders Are Moving On
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.