โ† Back to Cyber Intelligence News
Live Threat Intelligence API โ€” Query this CVE and all KEV alerts in real-time
cyber.mcp.brunosan.de
Cyber Threat Intelligence VULNERABILITY ๐Ÿ”ด 1ร—KEV

CVE-2026-5281 in Microsoft Edge (Chromium-based): Actively Exploited Zero-Day

๐Ÿ“… April 04, 2026 ๐Ÿ”ด Exploit Risk: 0.512 ๐Ÿ“Š Intelligence Score: 69/100 ๐Ÿ“ฐ 50 sources synthesized
TL;DR โ€” Read this first
Intelligence Metadata
First Reported Bynvd.nist.gov
Outbreak Velocity1260 minutes spread to 3 unique domains
Consensus50 sources across 3 unique domains
CVSS Score7.5
EPSS Score0.03034 (approx. 90th percentile)
CISA KEV StatusConfirmed
Exploit Risk Score0.5121
Race LabelZERO-DAY RACE

Technical Analysis

CVE-2026-5281 is a use-after-free vulnerability within the Dawn component of the open-source Chromium project. Dawn is a graphics abstraction layer used for WebGPU. Microsoft Edge, being Chromium-based, inherits this vulnerability. The attack vector requires a user to navigate to a specially crafted webpage.

Upon visiting the malicious site, the flaw can be triggered, leading to a dangling pointer in memory. A threat actor can then manipulate memory to achieve arbitrary code execution within the context of the browser's sandboxed renderer process. While initial execution is sandboxed, this type of vulnerability is frequently chained with a sandbox escape (a separate vulnerability) to achieve full system compromise. The high-level of abstraction in components like Dawn can introduce complex memory management states that are prone to such flaws.

Affected Systems

Vendor: Microsoft
Affected Versions:
  • Microsoft Edge (Chromium-based)
Exposure: Publicly facing systems with user web browsing activity. Exploitation requires user interaction (visiting a malicious URL).
Blast Radius: High. Affects all systems running unpatched versions of Microsoft Edge.

Intelligence Context

The primary driver for immediate action is the CONFIRMED inclusion of CVE-2026-5281 in the CISA KEV catalog on 2026-04-01. This designation overrides the vulnerability's CVSS score of 7.5 and Microsoft's low vendor risk score, as it provides definitive evidence of in-the-wild exploitation. The 'ZERO-DAY RACE' label indicates that attackers were leveraging this flaw before or concurrent with patch availability, minimizing the window for defenders. The EPSS score of 0.03034 further supports this urgency, placing it in the top ~10% of vulnerabilities likely to be exploited. This combination of signals mandates that this vulnerability be treated as a top priority for patching.

Remediation & Defense

Patch immediately. Prioritize all user-facing systems with Microsoft Edge installed.
Patch Status: Available
Patch Version: Not available in provided data. Users should update to the latest version of Microsoft Edge.
Workarounds:
  • Ensure Microsoft Edge is configured for automatic updates, which is the default setting.
  • Limit browsing to trusted websites until patches can be verified.
Detection Hints:
  • Monitor for anomalous child processes spawned by `msedge.exe`, such as `cmd.exe` or `powershell.exe`.
  • Inspect EDR logs for evidence of browser process memory manipulation or injection.
  • Analyze network traffic for connections from browser processes to unknown or suspicious domains.

Source Timeline

CVE-2026-5281 Microsoft Edge Chromium Use-after-free KEV Zero-day