Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    Spotify and Universal Music Group Strike a Deal for AI-Powered Remix and Cover Song Tool

    May 21, 2026

    Google accidentally exposed details of unfixed Chromium flaw

    May 21, 2026

    Powering Modern Data Workloads with Cisco UCS and Qumulo

    May 21, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»Google accidentally exposed details of unfixed Chromium flaw
    IT/ Cybersecurity

    Google accidentally exposed details of unfixed Chromium flaw

    big tee tech hubBy big tee tech hubMay 21, 2026004 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    Google accidentally exposed details of unfixed Chromium flaw
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Google accidentally exposed details of unfixed Chromium flaw

    Google has accidentally leaked details about an unfixed issue in Chromium that keeps JavaScript running in the background even when the browser is closed, allowing remote code execution on the device.

    The flaw was reported by security researcher Lyra Rebane and acknowledged as valid in December 2022, as per the thread on Chromium Issue Tracker.

    An attacker could exploit the problem to create a malicious webpage with a Service Worker, such as a download task, that never terminates. Rebane says that this could allow an attacker to execute JavaScript code on the visitors’ devices.

    “It’s realistic to get tens of thousands of pageviews for creating a ‘botnet’, and people won’t be aware that JavaScript can be remotely executed on their device,” Rebane says in the original bug report.

    Potential exploitation scenarios include using compromised browsers to launch distributed denial-of-service (DDoS) attacks, proxying malicious traffic, and arbitrarily redirecting traffic to target sites.

    The issue impacts all Chromium-based browsers, including Google Chrome, Microsoft Edge, Brave, Opera, Vivaldi, and Arc.

    Persistent bug

    On October 26, 2024, a Google developer noticed that the issue was still open and described it as a “serious vulnerability” that needed a status update “to ensure that there’s progress.”

    This year, on February 10, the issue was marked as fixed and reopened just a few minutes later due to several concerns.

    Since it was a security problem, the labels for the bug were updated so it could go through the Chrome Vulnerability Rewards Program (VRP) Panel, and the issue was marked as fixed on February 12, although a patch had not been shipped.

    An automated email informed Rebane that she had been awarded a bug bounty of $1,000.

    All access restrictions on Chromium Issue Tracker were removed on May 20, since the bug had been closed for more than 14 weeks and marked as fixed in the system.

    On the same day, Rebane tested the fix and noticed that the problem was still present in Chrome Dev 150 and Edge 148.

    “Back in 2022, I found a bug that would let me, with no user interaction, turn any Chromium-based browser into a permanent JS botnet member,” the researcher said in a post yesterday.

    “In Edge, you wouldn’t even notice anything out of place, and would stay connected to the C2 even after closing the browser.”

    After noticing that the exploit still worked, the researcher realized that Google had likely published the details by mistake.

    To make matters worse, the download pop up that appeared when triggering the exploit previously no longer comes up in the latest Edge, making the exploit even stealthier.

    “OH NO I JUST REALIZED THIS IS NOT ACTUALLY PROPERLY FIXED AND STILL WORKS,” posted Rebane on Mastodon.

    “Even worse, Edge no longer even makes the download menu pop up, so it’s completely silent JS RCE that keeps running even after you close the browser !! all from just visiting a single website once !!”

    Although the issue was made private again, the exposure lasted long enough for the information to leak.

    Rebane told Ars Technica that Google’s exposure would make exploitation “pretty easy,” however, scaling it into a large botnet is more complicated.

    She also clarified that the bug does not bypass browser security boundaries and doesn’t give attackers access to the victim’s emails, files, or the host OS.

    Given that the issue details have been leaked, the risk to a large number of users is significant, and Google will most likely treat this as urgent, releasing emergency fixes soon.

    BleepingComputer has reached out to Google for a comment on this exposure, but we have not received a response by publication.


    article image

    Automated pentesting tools deliver real value, but they were built to answer one question: can an attacker move through the network? They were not built to test whether your controls block threats, your detection rules fire, or your cloud configs hold.

    This guide covers the 6 surfaces you actually need to validate.

    Download Now



    Source link

    accidentally Chromium details Exposed Flaw Google unfixed
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    Microsoft Open-Sources RAMPART and Clarity to Secure AI Agents During Development

    May 21, 2026

    CISA Admin Leaked AWS GovCloud Keys on Github – Krebs on Security

    May 20, 2026

    Why geopolitical turmoil is a gift for scammers, and how to stay safe

    May 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Spotify and Universal Music Group Strike a Deal for AI-Powered Remix and Cover Song Tool

    May 21, 2026

    Google accidentally exposed details of unfixed Chromium flaw

    May 21, 2026

    Powering Modern Data Workloads with Cisco UCS and Qumulo

    May 21, 2026

    TEM analysis of dicarboxylic acid-induced transition from unilamellar to multilamellar MEL-A vesicles

    May 21, 2026
    Timer Code
    15 Second Timer for Articles
    20
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    Spotify and Universal Music Group Strike a Deal for AI-Powered Remix and Cover Song Tool

    May 21, 2026

    Google accidentally exposed details of unfixed Chromium flaw

    May 21, 2026

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2026 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.