Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2026-0102

Опубликовано: 17 фев. 2026
Источник: msrc
CVSS3: 3.1
EPSS Низкий

Описание

Microsoft Edge (Chromium-based) Defense in Depth Vulnerability

Under specific conditions, a malicious webpage may trigger autofill population after two consecutive taps, potentially without clear or intentional user consent. This could result in disclosure of stored autofill data such as addresses, email, or phone number metadata.

FAQ

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user must visit the attacker‑controlled webpage, and perform the two tap gestures that cause autofill to activate.

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to craft deceptive or invisible form elements and user to perform two sequential taps.

What is the version information for this release?

Microsoft Edge VersionDate ReleasedBased on Chromium Version
145.0.3800.5802/17/2026145.0.7632.45/.46

According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L),but lead to no loss of availability (A:N) and integrity (I:N)? What does that mean for this vulnerability?

An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality) but not all resources within the impacted component may be divulged to the attacker. The attacker cannot make changes to disclosed information (Integrity) or limit access to the resource (Availability).

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Unlikely

EPSS

Процентиль: 3%
0.00015
Низкий

3.1 Low

CVSS3

Связанные уязвимости

CVSS3: 3.1
nvd
около 1 месяца назад

Under specific conditions, a malicious webpage may trigger autofill population after two consecutive taps, potentially without clear or intentional user consent. This could result in disclosure of stored autofill data such as addresses, email, or phone number metadata.

CVSS3: 3.1
github
около 1 месяца назад

Under specific conditions, a malicious webpage may trigger autofill population after two consecutive taps, potentially without clear or intentional user consent. This could result in disclosure of stored autofill data such as addresses, email, or phone number metadata.

CVSS3: 3.1
fstec
около 1 месяца назад

Уязвимость браузера Microsoft Edge (на базе Chromium), связанная с недостатками разграничения доступа к личной информации, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 3%
0.00015
Низкий

3.1 Low

CVSS3