Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chrome “WebView” Vulnerability Allows Hackers to Bypass Security Restrictions

Chrome “WebView” Vulnerability Allows Hackers to Bypass Security Restrictions

Posted on January 7, 2026January 7, 2026 By CWS

Google has launched an pressing safety replace for the Chrome browser to handle a high-severity vulnerability within the WebView tag part that would permit attackers to bypass vital safety restrictions.

Google rolled out Chrome model 143.0.7499.192/.193 for Home windows and Mac, and 143.0.7499.192 for Linux, by its Secure channel, to handle CVE-2026-0628.

The replace is being rolled out to customers steadily over the approaching days and weeks. The safety flaw, tracked as CVE-2026-0628, stems from inadequate coverage enforcement within the WebView tag part.

CVE IDSeverityComponentDescriptionCVE-2026-0628HighWebView tagInsufficient coverage enforcement within the WebView tag.

WebView Challenge Exposes Apps to Assaults

WebView is a vital Chrome part that allows purposes to show internet content material inside their interfaces with out launching a full browser.

A high-severity score means attackers might bypass safety controls, resulting in unauthorized entry, information leaks, or the execution of malicious code in apps that use WebView.

In step with accountable disclosure practices, Google has briefly restricted entry to detailed bug info till most customers have put in the safety patch.

This method prevents malicious actors from exploiting the vulnerability whereas customers replace their programs.

Google acknowledged contributions from exterior safety researchers and emphasised its dedication to collaborative safety efforts.

Google employs a number of detection methodologies, together with AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Management Move Integrity, libFuzzer, and AFL, to establish vulnerabilities throughout growth cycles.

Customers ought to instantly replace Chrome to the newest model by navigating to Settings > Assist > About Google Chrome. The browser will mechanically examine for and set up accessible updates.

Organizations utilizing Chrome in enterprise environments ought to prioritize deploying this safety patch throughout their infrastructure.

Google continues to encourage safety researchers to report vulnerabilities by its bug bounty program, reinforcing the significance of collaborative safety in defending customers worldwide.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Bypass, Chrome, Hackers, Restrictions, Security, Vulnerability, WebView

Post navigation

Previous Post: Ongoing Attacks Exploiting Critical RCE Vulnerability in Legacy D-Link DSL Routers
Next Post: Top 10 Best Dynamic Malware Analysis Tools in 2026

Related Posts

Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested Cyber Security News
North Korean Hackers Target Crypto with Fake MetaMask North Korean Hackers Target Crypto with Fake MetaMask Cyber Security News
Critical Vulnerability in Azure Bastion Let Attackers Bypass Authentication and Escalate privileges Critical Vulnerability in Azure Bastion Let Attackers Bypass Authentication and Escalate privileges Cyber Security News
Web-to-App Funnels: Pros And Cons Web-to-App Funnels: Pros And Cons Cyber Security News
Android Remote Data-Wipe Malware Attacking Users Leveraging Google’s Find Hub Android Remote Data-Wipe Malware Attacking Users Leveraging Google’s Find Hub Cyber Security News
New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark