By falco365 · Published April 22, 2026

CVE-2026-5281: Chrome zero-day in Dawn/WebGPU under active exploitation

A high-severity use-after-free in Chrome's Dawn WebGPU implementation is being exploited in the wild. CISA added CVE-2026-5281 to the Known Exploited Vulnerabilities catalog on April 1, 2026.

CVE-2026-5281: Chrome zero-day in Dawn/WebGPU under active exploitation
Analysis

Google shipped an emergency Chrome update for CVE-2026-5281, a high-severity use-after-free in Dawn — the open-source implementation of the WebGPU standard embedded in Chrome. A crafted HTML page can trigger the bug in the renderer process and gain arbitrary code execution inside the renderer sandbox. CISA added the CVE to its KEV catalog on April 1, 2026, confirming in-the-wild exploitation.

Why Dawn keeps attracting attacker attention

Dawn is a relatively new, large, GPU-adjacent codebase written in C++. It sits on the happy path of every Chrome tab that renders WebGPU content — which increasingly includes AI inference demos, ML-accelerated web apps, and browser-based games. From an attacker's perspective it is a great target: complex binary parser, privileged position relative to the renderer, lightly audited compared to V8, and reachable from a single click on a malicious link.

This is the second Dawn/WebGPU CVE in the last six months. Expect more. The WebGPU attack surface is in the same phase of the maturity curve that WebGL was in 2012–2014 — feature-rich, widely deployed, and findable.

A renderer RCE is not a full sandbox escape on its own, but it is the critical first link of a chain that has ended in full system compromise many times. Patch Chrome the same day it ships, not the next sprint.
Who is affected
  • Every Chrome and Chromium-based browser user on versions below the patched release — Chrome, Edge, Brave, Opera, Arc, and Electron-based desktop apps bundling an older Chromium.
  • Electron apps are especially relevant: Slack, Discord, VS Code, 1Password, Notion, Signal Desktop, and countless others ship their own Chromium. Their patching cadence is slower than browser auto-update. Inventory your Electron apps and confirm they have caught up.
  • Managed browser fleets (Chrome Enterprise, Edge WDAC, Puppet/Intune-managed endpoints) where auto-update is disabled. Verify the rollout reached production.
Mitigation
  • Confirm Chrome version on every endpoint. chrome://settings/help will force an update check.
  • Audit Electron apps for bundled Chromium version. If the vendor hasn't shipped an update, raise it with them and consider restricting network access for that app until they do.
  • Block WebGPU in high-risk profiles via the Disable3DAPIs enterprise policy as a short-term mitigation. This breaks some ML demo sites but removes the attack surface entirely.
  • Monitor for renderer crashes with unusual signatures — one of the earliest tells for in-the-wild browser exploitation.
The broader pattern

Chrome zero-days are, by this point, a standing item on any enterprise security operations calendar. What has changed in 2026 is the distribution channel: exploitation is no longer limited to nation-state use against specific targets. Commodity infostealers are bundling fresh browser zero-days within days of public disclosure, and using them to hoover up saved passwords, session cookies, and crypto wallet keys from anyone who browses the wrong page. The old advice — "just keep your browser updated" — remains the most important single piece of end-user security hygiene. It has never been more important.