Gemini Live Panel Hijack: When Browser Extensions Jump the Trust Boundary
Chrome just turned its AI assistant into a privileged browser component. That shift quietly changed the extension threat model.
Unit 42 disclosed CVE-2026-0628, a high severity vulnerability in Chrome’s new Gemini Live panel. A malicious extension with basic permissions could inject code into the Gemini panel and inherit its elevated capabilities.
The Core Issue
Traditional browser security assumes extensions cannot control privileged browser components. Gemini Live broke that assumption by loading a powerful AI panel inside the browser chrome, then accidentally allowing extensions to intercept and modify its content using declarativeNetRequest rules.
Once injected, the attacker code runs inside the Gemini panel context, which has access to privileged capabilities like file access, camera, microphone, and screenshots.
Extensions can edit ordinary web pages by design. They are not supposed to edit privileged browser panels. Gemini Live blurred that boundary, and CVE-2026-0628 let extensions jump it.
Attack Flow
[EXT]
[DNR]
[GEM]
[SYS]
The attacker does not need to exploit memory corruption. The panel itself provides privileged APIs. The extension only needs to insert script into the panel.
Why This Matters For Agentic Browsers
Gemini Live is an early example of a larger shift. AI assistants are now embedded directly in browsers and given the same view the user has. That means they can see, click, and act on any site with privileged context.
When that assistant is compromised, every browser permission becomes an attack surface.
The New Extension Risk Model
Extensions used to be confined to web pages. Agentic browser panels sit above those pages and can control them. The moment that boundary blurs, extensions become a path to full browser level privileges.
OWASP Agentic AI Mapping
This vulnerability maps directly to the 2026 OWASP Agentic Top 10 categories:
The key lesson is not about prompt injection. It is about privilege context. The AI panel is a privileged execution context, and extensions should never be able to alter it.
What Security Teams Should Do Now
The Broader Shift
Agentic browsers are not just browsers with a chatbot. They are privileged automation engines embedded in a trusted UI. When one component is hijacked, the entire browsing environment becomes the attack surface.
The Gemini Live incident is a warning shot. As more browsers add autonomous panels, the extension model needs to be rethought from the ground up.
Rogue Security provides runtime security for agentic AI systems, including browser level monitoring and high risk tool enforcement.
Learn more at rogue.security