HomeVulnerabilityGoogle fixes excessive severity Chrome flaw with public exploit

Google fixes excessive severity Chrome flaw with public exploit

Google has launched emergency security updates to patch a high-severity vulnerability within the Chrome internet browser that might result in full account takeover following profitable exploitation.

Whereas it is unclear if this security flaw has been utilized in assaults, the corporate warned that it has a public exploit, which is the way it often hints at lively exploitation.

“Google is conscious of studies that an exploit for CVE-2025-4664 exists within the wild,” Google stated in a Wednesday security advisory.

The vulnerability was found by Solidlab security researcher Vsevolod Kokorin and is described as an inadequate coverage enforcement in Google Chrome’s Loader part that lets distant attackers leak cross-origin knowledge through maliciously crafted HTML pages.

“You most likely know that in contrast to different browsers, Chrome resolves the Hyperlink header on subresource requests. However what’s the issue? The problem is that the Hyperlink header can set a referrer-policy. We will specify unsafe-url and seize the total question parameters,” Kokorin defined.

See also  New Linux Malware Marketing campaign Exploits Oracle Weblogic to Mine Cryptocurrency

“Question parameters can comprise delicate knowledge – for instance, in OAuth flows, this may result in an Account Takeover. Builders not often think about the potential for stealing question parameters through a picture from a Third-party useful resource.”

Leaked OAuth access token
Leaked OAuth entry token (Vsevolod Kokorin)

​Google mounted the flaw for customers within the Steady Desktop channel, with patched variations (136.0.7103.113 for Home windows/Linux and 136.0.7103.114 for macOS) rolling out to customers worldwide.

Though the corporate says the security updates will roll out over the approaching days and weeks, they had been instantly obtainable when BleepingComputer checked for updates.

Customers who do not need to replace Chrome manually may also let the browser mechanically examine for brand spanking new updates and set up them after the subsequent launch.

In March, ​Google additionally mounted a high-severity Chrome zero-day bug (CVE-2025-2783) that was abused to deploy malware in espionage assaults concentrating on Russian authorities organizations, media retailers, and academic establishments.

See also  The rise of the vCISO: From area of interest to necessity?

Kaspersky researchers who found the actively exploited zero-day stated that the attackers use CVE-2025-2783 exploits to bypass Chrome sandbox protections and infect targets with malware.

Final 12 months, Google patched 10 zero-days disclosed in the course of the Pwn2Own hacking competitors or exploited in assaults.

Red Report 2025

Primarily based on an evaluation of 14M malicious actions, uncover the highest 10 MITRE ATT&CK methods behind 93% of assaults and how you can defend in opposition to them.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular