Medium severity6.5NVD Advisory· Published Jul 23, 2016· Updated May 6, 2026
CVE-2016-5135
CVE-2016-5135
Description
WebKit/Source/core/html/parser/HTMLPreloadScanner.cpp in Blink, as used in Google Chrome before 52.0.2743.82, does not consider referrer-policy information inside an HTML document during a preload request, which allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via a crafted web site, as demonstrated by a "Content-Security-Policy: referrer origin-when-cross-origin" header that overrides a "" element.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- googlechromereleases.blogspot.com/2016/07/stable-channel-update.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-1485.htmlnvd
- www.debian.org/security/2016/dsa-3637nvd
- www.securityfocus.com/bid/92053nvd
- www.securitytracker.com/id/1036428nvd
- www.ubuntu.com/usn/USN-3041-1nvd
- codereview.chromium.org/1913983002nvd
- crbug.com/605451nvd
- security.gentoo.org/glsa/201610-09nvd
News mentions
0No linked articles in our index yet.