Illustration of a malicious browser extension icon hovering over the Google Chrome Gemini AI panel, with data flowing out, symbolizing a security vulnerability.
Technology & Gadgets

Chrome’s Gemini Panel Vulnerability: Malicious Extensions Could Seize Control of Your Data

Share
Share
Pinterest Hidden

A significant security flaw in Google Chrome, now patched, recently exposed users to a sophisticated attack vector, allowing malicious browser extensions to escalate privileges and potentially gain unauthorized access to sensitive local files and hardware. This vulnerability, identified as CVE-2026-0628 with a CVSS score of 8.8, underscores the evolving challenges in browser security, especially with the deeper integration of artificial intelligence (AI) capabilities.

The Gemini Panel: A New Attack Surface

The core of this vulnerability lay in “insufficient policy enforcement within the WebView tag” in Google Chrome versions prior to 143.0.7499.192. Discovered and reported by Gal Weizman of Palo Alto Networks Unit 42 on November 23, 2025, the flaw specifically targeted Chrome’s new Gemini Live panel, an AI integration introduced in September 2025.

How Malicious Extensions Could Seize Control

According to the NIST National Vulnerability Database (NVD), a cleverly crafted malicious extension, once installed by an unsuspecting user, could inject scripts or HTML into a privileged page. This seemingly basic permission, facilitated by the declarativeNetRequest

API (often used by ad-blockers), could then be leveraged to manipulate the Gemini panel. When the Gemini app loaded within this panel, Chrome inadvertently granted it access to powerful capabilities, effectively blurring the line between an expected extension behavior and a critical security breach.

The consequences of such an exploit were alarming. Attackers could achieve privilege escalation, enabling them to:

  • Access the victim’s camera and microphone without explicit permission.
  • Take screenshots of any website being viewed.
  • Gain access to local files on the user’s system.

The Double-Edged Sword of AI in Browsers

This incident highlights a burgeoning attack vector stemming from the direct integration of AI and “agentic capabilities” into web browsers. While features like real-time content summarization, translation, and automated task execution promise enhanced user experience, they also introduce new security paradigms.

Privileged Access, Persistent Threats

The fundamental challenge lies in the necessity for these AI agents to possess privileged access to the browsing environment to perform multi-step operations. This becomes a “double-edged sword” when attackers exploit this access. By embedding hidden prompts in a malicious web page, and then tricking a user into visiting it through social engineering, an attacker could instruct the AI assistant to perform actions that would typically be blocked by the browser. This could lead to data exfiltration or even remote code execution.

Even more concerning, a malicious web page could manipulate the AI agent to store these harmful instructions in memory, allowing the exploit to persist across multiple browsing sessions, silently compromising the user over time.

Revisiting Classic Browser Security Risks

Unit 42 researchers warn that the integration of AI side panels in agentic browsers effectively reintroduces classic browser security risks within a new, high-privilege context. “By placing this new component within the high-privilege context of the browser, developers could inadvertently create new logical flaws and implementation weaknesses,” noted Gal Weizman. This includes vulnerabilities like cross-site scripting (XSS), further privilege escalation, and side-channel attacks, all exploitable by less-privileged websites or extensions.

The successful exploitation of CVE-2026-0628 demonstrated a fundamental undermining of Chrome’s security model. It allowed arbitrary code execution at “gemini.google[.]com/app” via the browser panel, granting access to data that should have remained secure.

Google’s Swift Response and User Vigilance

Google acted promptly, patching the vulnerability in early January 2026 with version 143.0.7499.192/.193 for Windows/Mac and 143.0.7499.192 for Linux. This swift action is crucial, but the incident serves as a potent reminder for users to maintain vigilance, particularly regarding the installation of browser extensions and the sources of web content they interact with.

As AI continues to be woven into the fabric of our digital tools, the cybersecurity landscape will undoubtedly grow more complex. This Chrome vulnerability is a stark illustration of the ongoing battle to secure innovation, emphasizing the critical need for robust policy enforcement and continuous security research in the age of intelligent browsers.


For more details, visit our website.

Source: Link

Share