Google has issued an emergency security patch to address a high-severity Chrome zero-day vulnerability that allows for remote code execution (RCE). The flaw, identified as CVE-2026-2441, is a "Use After Free" vulnerability in the browser's Cascading Style Sheets (CSS) rendering engine.
Security researcher Shaheen Fazim reported the flaw on February 11, 2026, prompting a swift response from Google's security team.
The CVE-2026-2441 RCE flaw allows an attacker to compromise a target system by luring the user to a specially crafted webpage. “Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page,” says its description.
In a typical scenario, when the victim's browser renders the malicious site, it triggers a memory-corruption error in the CSS component. This can cause the browser to crash or, more dangerously, allow the threat actor to execute arbitrary code on the operating system, potentially escaping the browser's security sandbox.
The search giant confirmed its awareness that an exploit for the vulnerability already exists and is being used in active attack campaigns. Google has restricted access to the full technical details of the bug until a majority of users have applied the patch.
To mitigate the threat, Google has released an essential patch, which brings Chrome to version 145.0.7632.75/.76 for Windows and macOS and version 144.0.7559.75 for Linux.
While the update will deploy automatically over the coming days, users are strongly urged to manually initiate the update process immediately. Navigate to Chrome's Menu → Help → About Google Chrome to force the browser to check for and install the latest version.
Last month, Google patched another high-severity WebView flaw in the tag component. A flaw in the Chrome Loader component was actively exploited in 2025, with a fix released in May. Last week, TechNadu reported on novel malicious Chrome extensions that exploit AI popularity or steal Meta Business Suite data.