{"id":"CVE-2023-4368","details":"Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)","modified":"2026-03-15T22:03:15.899988Z","published":"2023-08-15T18:15:13.597Z","related":["openSUSE-SU-2023:0234-1","openSUSE-SU-2023:0251-1","openSUSE-SU-2024:13139-1","openSUSE-SU-2024:13144-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202401-34"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5479"},{"type":"ADVISORY","url":"https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/"},{"type":"REPORT","url":"https://crbug.com/1467751"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"116.0.5845.96"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-4368.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}