A serious security vulnerability has been identified in the AI assistant integrated within Google Chrome, potentially allowing attackers to access a user’s camera, microphone, local files and on-screen data.
The vulnerability, tracked as CVE-2026-0628, was discovered by researchers at Unit 42. The issue was responsibly reported to Google on October 23, 2025. Google confirmed the flaw and released a security patch on January 5, 2026 before publicly disclosing the issue.
The problem affects the Gemini feature integrated into Chrome. Gemini operates as a built-in AI side panel that can summarize webpages, automate tasks and provide contextual assistance while browsing.
To perform these functions, the AI panel is granted elevated permissions. These include access to the device’s camera, microphone, local files and screenshot capabilities. While this architecture enables advanced features, it also increases the browser’s attack surface.
The flaw was linked to how Chrome handled the declarativeNetRequest API, a browser extension permission used to intercept and modify web requests. Researchers discovered a difference in how Chrome processed requests to the Gemini panel URL.
When the address loads in a regular browser tab, extensions can inject JavaScript but receive no special privileges. However, when the same URL loads inside the Gemini AI panel, Chrome grants it higher system-level permissions.
By exploiting this difference, a malicious browser extension could inject code into the Gemini panel and take control of its privileged functions.
Once compromised, attackers could activate the camera and microphone without user consent, capture screenshots of sensitive data, access local files and directories, or launch phishing attacks through the trusted AI interface.
Security experts warn that phishing through the Gemini panel is particularly dangerous because the interface appears as a trusted component of the browser.
Extension-based attacks have traditionally been seen as lower risk. However, the rise of AI-powered browser panels increases the potential damage if an extension becomes malicious.
In recent years, the number of harmful browser extensions uploaded to web stores has increased. Some are removed quickly, but others may reach thousands of users before detection. In other cases, legitimate extensions have been taken over by attackers and updated with malicious code.
In corporate environments, such attacks could expose sensitive data or enable surveillance through compromised devices.
Google released a patch on January 5, 2026 to address the issue. Users who update to the latest version of Chrome are protected and organizations are advised to ensure all systems are updated immediately.
Also read: Viksit Workforce for a Viksit Bharat
Do Follow: The Mainstream LinkedIn | The Mainstream Facebook | The Mainstream Youtube | The Mainstream Twitter
About us:
The Mainstream is a premier platform delivering the latest updates and informed perspectives across the technology business and cyber landscape. Built on research-driven, thought leadership and original intellectual property, The Mainstream also curates summits & conferences that convene decision makers to explore how technology reshapes industries and leadership. With a growing presence in India and globally across the Middle East, Africa, ASEAN, the USA, the UK and Australia, The Mainstream carries a vision to bring the latest happenings and insights to 8.2 billion people and to place technology at the centre of conversation for leaders navigating the future.



