Chrome Gemini Flaw Let Rogue Extensions Hijack AI Panel


TL;DR

  • Vulnerability: CVE-2026-0628 (CVSS 8.8) allowed rogue Chrome extensions with basic permissions to hijack the Gemini panel’s camera, microphone, and file access.
  • Root Cause: Chrome engineers failed to include the chrome://glic WebView in the blocklist that prevents extensions from intercepting privileged browser components.
  • Patch: Google fixed the vulnerability in Chrome 143.0.7499.192 in January 2026, after Palo Alto Networks researcher Gal Weizman reported it in November 2025.
  • Broader Risk: Each new privileged AI component added to Chrome expands the attack surface available to malicious extensions, a danger Glic Jack makes concrete.

Chrome’s Gemini panel requires camera and microphone access to function as an AI assistant. That same elevated access, researchers found, could be claimed by any rogue extension, including one with only the low-level permissions an ad blocker uses. CVE-2026-0628 on NIST NVD describes the flaw as “insufficient policy enforcement in the WebView tag,” enabling script injection into a privileged page. The issue carries a CVSS score of 8.8 and was dubbed “Glic Jack” (shorthand for Gemini Live in Chrome hijack) by the Palo Alto Networks Unit 42 researcher who identified it. Google patched the vulnerability in January 2026.

What Attackers Could Do

The Gemini panel’s privileged position inside Chrome is what made the vulnerability so consequential. Gemini Live is built into Chrome with the ability to grab screenshots, read local files, and activate a device’s camera or microphone. A rogue extension exploiting Glic Jack could leverage those same capabilities without user knowledge or consent, accessing the victim’s camera and microphone, capturing screenshots of any open website, and reading locally stored files on the device.

Furthermore, attackers could inject JavaScript into a more trusted browser context, intercepting and tampering with traffic flowing to and from the Gemini panel. Instructions injected through the flaw could persist across sessions, converting a temporary compromise into a durable foothold on the victim’s machine.

Despite controlling only the basic permission set typical of an ad blocker, an extension was sufficient to trigger the vulnerability. The asymmetry – where minimal extension privileges could reach the highest-privilege component of the browser – is precisely what researchers found alarming. That threat profile far exceeds what Chrome’s extension permission model was designed to contain.

How the Attack Worked

That asymmetry had a specific technical origin rooted in Chrome’s architecture. Chrome uses the chrome://glic internal panel URL to load its Gemini side panel, which embeds the Gemini web app from gemini.google.com inside a WebView component. That WebView is a privileged container that Chrome equips with expanded system capabilities, including camera, microphone, and file access.

Moreover, the attack path ran through the declarativeNetRequest API, a Chrome extension interface that allows extensions to intercept and modify HTTPS web requests. It is the same API used by content blockers and is included in a basic, low-level permission set that Chrome users approve routinely. Yet the API was not designed to reach into privileged browser-internal components – an assumption Glic Jack exposed as unenforceable.