VULNERABILITY ๐ด 1รKEV
Technical details for CVE-2026-5281 are not available in the provided intelligence. However, its inclusion in the CISA KEV catalog provides CONFIRMED evidence of active exploitation. The vulnerability is part of a cluster of high and critical severity issues disclosed for Google Chrome, including CVE-2026-34156 (CVSS 9.9) and CVE-2026-34162 (CVSS 10.0). While those vulnerabilities have higher CVSS scores, CVE-2026-5281 is the only one with confirmed exploitation.
The attack vector is INFERRED to be remote code execution or security bypass initiated by a user visiting a malicious or compromised web page. The exploit's existence in the wild demonstrates that the preconditions for a successful attack are met by threat actors, making it a practical and immediate threat to endpoints running vulnerable versions of the browser.
The key intelligence signal for CVE-2026-5281 is its status as a CISA KEV entry, which overrides all other predictive metrics. Despite a very low EPSS score (0.038th percentile) suggesting a low probability of exploitation, the KEV listing provides ground truth that exploitation is actively occurring. This is a classic scenario where defenders must prioritize patching based on confirmed threat activity rather than predictive scoring. The 'ZERO-DAY RACE' label, combined with its recent addition to the KEV catalog (1 day prior), indicates that threat actors are actively leveraging this vulnerability and defenders are in a critical window to apply patches before widespread campaigns emerge.