
Google Fixes Two Dangerous Chrome Zero-Day Vulnerabilities – Security Issue in Skia and V8
In today’s time, web browser security has become very important. We all use the internet for many things, whether it is online banking, social media, emails, or daily browsing. If any security flaw appears in the browser, hackers can take advantage of it and target users. Because of this reason, recently Google released an important security update for its popular web browser, Google Chrome. This update fixes two serious Chrome Zero-Day Vulnerabilities that were already being exploited in real-world attacks. These vulnerabilities affect two important components of Chrome Skia and V8. Both of these are core parts of the browser that help render web pages and run JavaScript code. Since attackers were already exploiting these flaws, Google advised users to update their browsers immediately. In this article, we will understand in simple language what these vulnerabilities are, how dangerous they can be, and what steps users should take to keep their browsers secure.
Two High-Severity Vulnerabilities Discovered in Chrome

Google fixed two security flaws that are tracked as CVE-2026-3909 and CVE-2026-3910. In the world of cybersecurity, CVE numbers are used to identify and track known security vulnerabilities. Both of these issues have received a CVSS score of 8.8, which indicates that they fall into the high-severity category. This means if attackers successfully exploit them, it could have a serious impact on users’ systems.
CVE-2026-3909 – Problem in the Skia Graphics Library

The first vulnerability was found in Skia. Skia is a graphics library used by Chrome to render visuals on web pages. Whenever you see images, icons, graphics, or text on a website, Skia plays an important role in rendering them. This vulnerability is known as an out-of-bounds write issue. In simple terms, it means the software might sometimes store data in a part of memory where it isn’t supposed to. If an attacker creates a specially crafted malicious webpage and a user opens it, the exploit can be triggered. After that, a memory access issue can occur inside the browser. This type of vulnerability can allow hackers to perform dangerous actions such as crashing the browser, corrupting memory, or running malicious code. The most risky part is that the user may not even realize that an attack is happening in the background. Simply opening a malicious webpage can activate the exploit.
CVE-2026-3910 – Security Flaw in the V8 JavaScript Engine

The second vulnerability is related to V8. V8 is Chrome’s JavaScript engine that runs website scripts and WebAssembly applications. This vulnerability happened due to an implementation flaw. This means there is an issue in the system’s design or coding that an attacker can exploit. If an attacker creates a specially crafted HTML page and a user opens it, the attacker may be able to execute arbitrary code inside the browser’s sandbox environment. Normally Chrome uses sandbox technology to isolate processes and maintain strong security. However, sometimes vulnerabilities allow attackers to bypass certain restrictions. If the exploit is successful, an attacker may run unauthorized scripts, access sensitive information inside the browser, or launch further attacks on the system. Advanced hackers sometimes combine multiple vulnerabilities to escape the sandbox and gain deeper control over the system.
Discovered by Google Security Researchers
An interesting fact is that these vulnerabilities were discovered by Google’s own security researchers. The issues were reported on March 10, 2026. Google has confirmed that exploits for these vulnerabilities already exist in the wild, meaning attackers are already using them. However, the company has intentionally not released detailed exploit information. Cybersecurity companies usually follow this approach so that attackers cannot easily gain more information and exploit the vulnerabilities more aggressively.
Multiple Chrome Zero-Day Attacks in 2026
This security update comes after another recent Chrome issue. In February 2026, Google fixed another high-severity vulnerability identified as CVE-2026-2441. That issue was found in Chrome’s CSS component and was classified as a use-after-free bug. Attackers were also using that vulnerability as a zero-day exploit. This means that since the beginning of 2026, Google has already fixed three actively exploited zero-day vulnerabilities in Chrome. Zero-day vulnerabilities are considered the most dangerous because attackers exploit them before developers release a patch.
How to Install the Chrome Security Update

To protect users, Google has already released updated versions of Chrome. The latest secure versions are Chrome 146.0.7680.75 / 146.0.7680.76 for Windows and macOS, and Chrome 146.0.7680.75 for Linux. Updating the browser is a very simple process. Open the Chrome browser, click on the three-dot menu in the top-right corner, go to the Help option, and select About Google Chrome. Chrome will automatically check for updates. Once the update is installed, click on Relaunch to restart the browser. After restarting, the latest security patches will be applied.
Chromium-Based Browsers May Also Be Affected
Google Chrome is built on the Chromium open-source project. This means many other popular browsers also use the same technology. Because of this, these vulnerabilities may also affect browsers such as Microsoft Edge, Brave, Opera, and Vivaldi. These browsers usually release their own security patches after Chromium updates are available. Users should regularly check for updates and install them as soon as possible.
Why Ignoring Browser Updates Can Be Risky
Many users ignore browser updates or postpone them, but this habit can be risky. Browsers are one of the most common targets for cybercriminals because they directly interact with the internet and multiple websites. If a browser is outdated, hackers may exploit vulnerabilities to perform attacks such as malware infection, data theft, account hacking, system compromise, or phishing attacks. This is why regularly updating your browser is extremely important.
Final Thoughts
The recently discovered vulnerabilities in Chrome once again show that cybersecurity is an ongoing battle. Technology companies like Google continuously work to detect and fix vulnerabilities, but attackers also keep searching for new weaknesses. The good news is that Google responded quickly and released patches for the vulnerabilities affecting the Skia and V8 components. For users, the simplest and most effective step is to keep their browsers updated. Even a small update can help protect you from serious cyber threats. If you use Chrome or any Chromium-based browser, check today whether your browser is running the latest version.
FAQ
1. What are Chrome Zero-Day Vulnerabilities?
Chrome Zero-Day Vulnerabilities are security flaws in the Chrome browser that are discovered and exploited by attackers before developers release a patch or fix.
2. Which vulnerabilities were recently fixed by Google?
Google fixed two major vulnerabilities identified as CVE-2026-3909 in the Skia graphics library and CVE-2026-3910 in the V8 JavaScript engine.
3. Why are these vulnerabilities considered dangerous?
They are dangerous because attackers can exploit them through malicious web pages to crash the browser, access memory, or execute unauthorized code.
4. How can users protect themselves from these vulnerabilities?
Users should immediately update their Chrome browser to the latest version and regularly install security updates.
5. Are other browsers affected by these vulnerabilities?
Yes, browsers built on Chromium technology, such as Microsoft Edge, Brave, Opera, and Vivaldi, may also be affected until they release their own security patches.

