PAN-SA-2026-0004 Chromium: Monthly Vulnerability Update (April 2026)
Exploit Maturity
UNREPORTED
Response Effort
LOW
Recovery
USER
Value Density
DIFFUSE
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Automatable
NO
User Interaction
ACTIVE
Product Confidentiality
HIGH
Product Integrity
HIGH
Product Availability
HIGH
Privileges Required
NONE
Subsequent Confidentiality
NONE
Subsequent Integrity
NONE
Subsequent Availability
NONE
Description
Palo Alto Networks incorporated the following Chromium security fixes into our products:
- https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html
- https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html
- https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html
- https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_13.html
- https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_12.html
- https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html
| CVE | Summary |
|---|---|
| CVE-2026-2648 | Heap buffer overflow in PDFium |
| CVE-2026-2649 | Integer overflow in V8 |
| CVE-2026-2650 | Heap buffer overflow in Media |
| CVE-2026-3061 | Out of bounds read in Media |
| CVE-2026-3062 | Out of bounds read and write in Tint |
| CVE-2026-3063 | Inappropriate implementation in DevTools |
| CVE-2026-3536 | Integer overflow in ANGLE |
| CVE-2026-3537 | Object lifecycle issue in PowerVR |
| CVE-2026-3538 | Integer overflow in Skia |
| CVE-2026-3539 | Object lifecycle issue in DevTools |
| CVE-2026-3540 | Inappropriate implementation in WebAudio |
| CVE-2026-3541 | Inappropriate implementation in CSS |
| CVE-2026-3542 | Inappropriate implementation in WebAssembly |
| CVE-2026-3543 | Inappropriate implementation in V8 |
| CVE-2026-3544 | Heap buffer overflow in WebCodecs |
| CVE-2026-3545 | Insufficient data validation in Navigation |
| CVE-2026-3909 | Out of bounds write in Skia |
| CVE-2026-3910 | Inappropriate implementation in V8 |
| CVE-2026-3926 | Out of bounds read in V8 |
| CVE-2026-3927 | Incorrect security UI in PictureInPicture |
| CVE-2026-3935 | Incorrect security UI in WebAppInstalls |
| CVE-2026-3936 | Use after free in WebView |
| CVE-2026-3940 | Insufficient policy enforcement in DevTools |
| CVE-2026-4464 | Integer overflow in ANGLE |
| CVE-2026-4679 | Integer overflow in Fonts |
| CVE-2026-4680 | Use after free in FedCM |
| CVE-2026-5281 | Use after free in Dawn |
| CVE-2026-5284 | Use after free in Dawn |
| CVE-2026-5287 | Use after free in PDF |
| CVE-2026-5291 | Inappropriate implementation in WebGL |
| CVE-2026-5292 | Out of bounds read in WebCodecs |
Product Status
| Versions | Affected | Unaffected |
|---|---|---|
| Prisma Browser | < 145.16.12.110 | >= 146.3.8.76 |
Required Configuration for Exposure
No special configuration is required to be affected by this issue.
Severity: MEDIUM, Suggested Urgency: MODERATE
CVSS-BT: 6.1 / CVSS-B: 8.6 (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:L/U:Amber)
Exploitation Status
Palo Alto Networks is not aware of any malicious exploitation of this issue.
Solution
| CVE | Prisma Browser |
|---|---|
| CVE-2026-2648 | 145.16.12.110 |
| CVE-2026-2649 | 145.16.12.110 |
| CVE-2026-2650 | 145.16.12.110 |
| CVE-2026-3061 | 145.24.7.116 |
| CVE-2026-3062 | 145.24.7.116 |
| CVE-2026-3063 | 145.24.7.116 |
| CVE-2026-3536 | 145.30.9.160 |
| CVE-2026-3537 | 145.30.9.160 |
| CVE-2026-3538 | 145.30.9.160 |
| CVE-2026-3539 | 145.30.9.160 |
| CVE-2026-3540 | 145.30.9.160 |
| CVE-2026-3541 | 145.30.9.160 |
| CVE-2026-3542 | 145.30.9.160 |
| CVE-2026-3543 | 145.30.9.160 |
| CVE-2026-3544 | 145.30.9.160 |
| CVE-2026-3545 | 145.30.9.160 |
| CVE-2026-3926 | 146.3.7.72 |
| CVE-2026-3927 | 146.3.7.72 |
| CVE-2026-3935 | 146.3.7.72 |
| CVE-2026-3936 | 146.3.7.72 |
| CVE-2026-3940 | 146.3.7.72 |
| CVE-2026-3909 | 146.3.8.76 |
| CVE-2026-3910 | 146.3.8.76 |
| CVE-2026-4464 | 146.10.7.154 |
| CVE-2026-4679 | 146.16.6.165 |
| CVE-2026-4680 | 146.16.6.165 |
| CVE-2026-5281 | 146.16.9.178 |
| CVE-2026-5284 | 146.16.9.178 |
| CVE-2026-5287 | 146.16.9.178 |
| CVE-2026-5291 | 146.16.9.178 |
| CVE-2026-5292 | 146.16.9.178 |
Workarounds and Mitigations
No known workarounds exist for this issue.
CPE Applicability
- cpe:2.3:a:palo_alto_networks:prisma_browser:*:*:*:*:*:*:*:* is vulnerable from (including)145.7.9 and up to (excluding)145.7.9.76
Timeline
Initial Publication