Chrome Gemini vulnerability allowed malicious extensions to hijack AI and spy on users

Reviewed byNidhi Govil

3 Sources

Share

A high-severity vulnerability in Google Chrome's Gemini AI feature let malicious browser extensions escalate privileges and access system resources like webcams, microphones, and local files. Discovered by Palo Alto Networks, CVE-2026-0628 was patched in January, but it highlights growing security risks of agentic AI integration in browsers.

High-Severity Chrome Vulnerability Exposed Gemini AI to Exploitation

A Chrome Gemini vulnerability tracked as CVE-2026-0628 has revealed how deeply AI integration in browsers can reshape the threat model for users. Discovered by Gal Weizman, senior principal security researcher at Palo Alto Networks' Unit 42 team, the flaw allowed malicious browser extensions with basic permissions to hijack Google Chrome's Gemini Live AI panel and gain unauthorized access to system resources they were never meant to control

1

. The vulnerability was classified as high-severity and described as "insufficient policy enforcement in WebView tag in Google Chrome" that existed prior to version 143.0.7499.192 of the browser

1

.

Source: The Register

Source: The Register

How Malicious Browser Extensions Exploited the Gemini AI Agentic Browser Feature

The privilege escalation vulnerability worked by exploiting how Google Chrome handled extension network rules through the declarativeNetRequests API. A rogue extension with fairly standard permissions could intercept and tamper with traffic headed for the Gemini Live side panel, injecting JavaScript code into what should have been a privileged browser component

2

. Since the Gemini AI agentic browser feature is tightly integrated into Chrome to perform legitimate actions like capturing screenshots, reading local files, and activating webcam and microphone access, hijacking this panel granted extensions the same elevated privileges

2

.

An attacker who convinced a target to install an innocent-looking extension could exploit this policy problem to conduct surveillance, steal data, access local files and directories, or even deploy phishing attacks through what appeared to be a legitimate Gemini panel

1

. "Since the Gemini app relies on performing actions for legitimate purposes, hijacking the Gemini panel allows privileged access to system resources that an extension would not normally have," Unit 42 researchers explained

2

.

Source: ZDNet

Source: ZDNet

Patch Released After Private Disclosure to Google

Following Palo Alto Networks' private disclosure to Google in October last year, the Chrome security team developed a fix and included it in version 143.0.7499.192/.193 for Windows and macOS stable channels, with version 143.0.7499.192 for Linux

1

. The patch was released in early January before Unit 42 publicly disclosed the vulnerability

3

. Users should accept browser updates immediately when prompted to benefit from security patches that mitigate the risk of browser and data compromise

1

.

Security Risks of Agentic AI Create Expanded Attack Surface

This vulnerability underscores the security risks of agentic AI and the cybersecurity challenges that emerge when AI-driven tools receive privileged access to online accounts and system resources. AI integration in browsers requires these features to see what users see on screen and extract information from websites, creating an expanded attack surface that traditional browsers don't face

3

. Beyond conventional vulnerabilities requiring patch management, AI browsers can be susceptible to prompt injection attacks where malicious instructions hidden in source material hijack these tools to hand over sensitive information or conduct surveillance

1

.

Analyst firm Gartner has advised most organizations to avoid so-called agentic browsers, arguing that AI-driven automation with deep system hooks introduces risks that outweigh productivity benefits for many enterprises

2

. A recent MIT study found serious gaps in security testing during the "fast and loose" agentic AI development race, suggesting such technologies must be treated with caution

1

. Researchers have also documented Android malware tapping Google's Gemini model at runtime to interpret screenshots and automate on-device actions, demonstrating that attackers are actively experimenting with generative AI inside their tooling

2

.

Source: PYMNTS

Source: PYMNTS

What Users Should Watch For

The incident serves as a reminder that browser makers have worked for years to keep extensions boxed in so one bad download can't spy on your PC or access sensitive data. Adding an AI helper with permissions to read files and tap your microphone on command makes the threat model messier

2

. "While AI browsers or AI features implemented into existing browsers can improve the user experience, it's important to continue monitoring for potential security flaws," Unit 42 noted

3

. Managing the benefits of agentic browsers while balancing risk will be the true challenge for both consumers and businesses as we've yet to see the full security implications these technologies will pose.

Today's Top Stories

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2026 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo