iToverDose/Technology· 20 MAY 2026 · 21:01

Google warns millions of Chromium users about unfixed browser flaw

A newly disclosed Chromium vulnerability exposes millions of users to potential backdoor access and proxy attacks. Google warns the issue remains unfixed after 29 months, raising concerns over browser security.

Ars Technica3 min read0 Comments

Security researchers are sounding the alarm over a long-standing vulnerability in Chromium that could turn everyday browsers into unwitting proxies for cyberattacks. Google’s decision to release proof-of-concept exploit code underscores the severity of the flaw, which affects Chrome, Microsoft Edge, and other Chromium-based browsers used by hundreds of millions.

While the exploit currently offers limited capabilities, its persistence—unpatched for nearly two and a half years—has sparked concerns about potential escalation once additional vulnerabilities emerge. The flaw centers on the Browser Fetch API, a standard feature designed to handle large file downloads in the background.

How the exploit manipulates browser behavior

The vulnerability allows malicious websites to establish persistent connections to a user’s browser, effectively turning the device into a low-capacity node in a distributed network. Attackers can leverage these connections to:

  • Monitor browsing activity without user consent
  • Route traffic through the victim’s browser as an anonymous proxy
  • Launch small-scale denial-of-service attacks against other systems
  • Redirect users to malicious sites under the attacker’s control

Unlike traditional malware, this exploit does not require downloading or installing anything. A user simply visiting a compromised website could trigger the compromise, with the connection remaining active even after browser restarts or system reboots on certain platforms.

Why the 29-month delay matters

Google first acknowledged the issue in early 2024 but has yet to release a patch. Security teams argue that the delay stems from the complexity of fixing deep-seated architectural flaws in Chromium’s networking stack. In a statement, a Google spokesperson confirmed the exploit’s existence but emphasized that additional vulnerabilities would be required to escalate the threat beyond its current limited scope.

The lack of a patch heightens risks for enterprise environments and privacy-conscious users who rely on Chromium browsers as their primary gateway to the internet. Cybersecurity firm Rapid7 noted that while the immediate danger is contained, the exploit’s availability in the wild could inspire more sophisticated attacks if paired with future vulnerabilities.

What users and administrators can do now

Until an official fix arrives, experts recommend several mitigation strategies to reduce exposure:

  • Disable JavaScript for untrusted websites – The exploit requires JavaScript execution to initiate malicious connections.
  • Use browser extensions that restrict network activity – Tools like uBlock Origin or NoScript can block suspicious connections before they establish.
  • Monitor outgoing network traffic – Unusual browser-initiated connections may indicate compromise.
  • Isolate critical systems – Enterprise networks should segment browsers on high-value machines to limit lateral movement.

For developers working with Chromium’s codebase, the proof-of-concept code published by Google serves as a critical reference point for identifying affected systems. The snippet below demonstrates how the exploit initiates a persistent connection:

// Simplified example of the exploit's connection logic
fetch(' {
  method: 'GET',
  keepalive: true,  // Ensures connection persists across page loads
  mode: 'no-cors'   // Bypasses CORS restrictions for cross-origin requests
}).then(response => {
  console.log('Connection established');
});

The vulnerability’s prolonged existence highlights broader challenges in browser security, where core features designed for performance can inadvertently introduce attack vectors. As browsers evolve to support more complex web applications, the line between convenience and vulnerability continues to blur.

With no patch in sight, users must remain vigilant while waiting for an official resolution. The exploit’s release serves as both a warning and a reminder of the ongoing cat-and-mouse game between browser vendors and cybercriminals.

AI summary

Google, Chromium tabanlı tarayıcılarda ciddi bir güvenlik açığına dair sömürü kodu yayınladı. Chrome, Edge ve diğer tarayıcılarda milyonlarca kullanıcı risk altında. Korunma yöntemleri ve risk analizi.

Comments

00
LEAVE A COMMENT
ID #AA24EB

0 / 1200 CHARACTERS

Human check

9 + 9 = ?

Will appear after editor review

Moderation · Spam protection active

No approved comments yet. Be first.