Cybersecurity researchers have uncovered a serious security vulnerability in Google Chrome that could allow malicious browser extensions to escalate privileges and access sensitive user data. The flaw, identified as CVE-2026-0628, exposed a weakness in Chrome’s policy enforcement mechanism related to the WebView component and the newly integrated Gemini AI panel.
With a CVSS score of 8.8, the vulnerability was considered high severity and had the potential to give attackers access to local files, the camera, microphone, and other sensitive browser functions.
Google has since patched the issue in Chrome version 143.0.7499.192/193, released in January 2026 for Windows, Mac, and Linux.
Understanding CVE-2026-0628
The vulnerability stems from insufficient policy enforcement in Chrome’s WebView tag, which allowed attackers to manipulate privileged browser pages using specially crafted browser extensions.
According to the official vulnerability description, attackers could exploit the flaw if they successfully convinced a user to install a malicious extension. Once installed, the extension could inject scripts or HTML into privileged Chrome pages.
This injection allowed attackers to bypass standard browser security boundaries and execute unauthorized actions.
Cybersecurity researcher Gal Weizman from Palo Alto Networks Unit 42 discovered and reported the flaw on November 23, 2025.
How the Gemini Panel Became an Attack Vector
Google integrated Gemini AI into Chrome in September 2025, introducing a side panel that allows users to interact with the AI assistant directly inside the browser.
The Gemini panel provides several powerful capabilities, including:
- Content summarization
- Website translation
- Automated browsing tasks
- Interaction with system resources
However, these powerful capabilities also introduced new security risks.
The vulnerability allowed malicious extensions with minimal permissions to take control of the Gemini Live panel. Attackers could then inject JavaScript code into the Gemini interface and execute commands with elevated privileges.
This effectively allowed attackers to perform actions that regular browser extensions normally cannot.
Potential Impact of the Vulnerability
If exploited successfully, the vulnerability could allow attackers to perform several high-risk actions on a victim’s system.
1. Access to Local Files
Attackers could gain access to sensitive files stored on the user’s computer.
2. Camera and Microphone Activation
Malicious code could activate the device’s camera and microphone without user permission.
3. Website Screenshot Capture
Attackers could capture screenshots of any website visited by the user.
4. Arbitrary Code Execution
The injected code could run within the Gemini panel context, giving attackers extended control over browser behavior.
These capabilities essentially break the browser’s standard security model, which normally isolates extensions from privileged browser components.
Role of the declarativeNetRequest API
One key element that enabled this attack was the declarativeNetRequest API, a Chrome extension feature designed to intercept and modify web requests.
This API is commonly used by extensions such as:
- Ad blockers
- Privacy tools
- Content filtering extensions
However, researchers discovered that attackers could abuse this API to inject malicious JavaScript into the Gemini panel.
Because the Gemini panel runs in a high-privilege browser environment, the injected code gained access to powerful system capabilities.
AI Integration Is Expanding the Browser Attack Surface
This incident highlights an important security concern surrounding the integration of artificial intelligence directly into browsers.
Modern AI-powered browser features require deeper access to browsing environments so they can perform complex tasks such as:
- Multi-step web automation
- Content analysis
- Data extraction
- Context-aware assistance
While these features improve productivity, they also expand the attack surface for cybercriminals.
Researchers warn that AI browser assistants could become targets for attacks involving:
- Cross-site scripting (XSS)
- Privilege escalation
- Side-channel attacks
- Prompt injection via malicious web pages
If attackers embed hidden instructions or prompts inside malicious web pages, AI assistants may unknowingly execute harmful actions.
Why Browser Extensions Remain a Major Security Risk
Browser extensions remain one of the most common entry points for cyber attacks.
Even legitimate extensions may request excessive permissions that can later be abused.
In this case, the attacker only needed to convince the victim to install a specially crafted extension. Once installed, the extension could inject arbitrary code into the Gemini panel and exploit its privileged environment.
This highlights the importance of carefully reviewing extension permissions before installation.
How Users Can Protect Themselves
Although Google has already patched the vulnerability, users should follow basic security practices to reduce the risk of browser-based attacks.
1. Update Chrome Immediately
Ensure Chrome is updated to version 143.0.7499.192 or later.
2. Install Extensions Carefully
Only install extensions from trusted developers and avoid unknown or suspicious add-ons.
3. Review Extension Permissions
Check what permissions each extension requests and remove unnecessary ones.
4. Remove Unused Extensions
Extensions you no longer use should be removed to reduce potential security risks.
5. Use Security Monitoring Tools
Enterprise environments should monitor browser activity and extension installations.
Final Thoughts
The discovery of CVE-2026-0628 demonstrates how new browser features, particularly AI-powered tools like the Gemini panel, can introduce unexpected security vulnerabilities.
While AI integration improves the browsing experience, it also creates new opportunities for attackers to exploit privileged browser environments.
As browsers continue evolving into AI-driven platforms, maintaining strong security controls around extensions, APIs, and privileged components will become increasingly important.
Users and organizations alike should remain vigilant and ensure browsers and extensions are always kept up to date.