Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chrome Vulnerabilities Let Attackers Execute Malicious Code Remotely

Posted on May 22, 2025May 22, 2025 By CWS

Google has launched an pressing safety replace for Chrome after discovering a number of high-severity vulnerabilities that would enable attackers to execute malicious code remotely on customers’ programs. 

Essentially the most important flaw, a “Use after free” vulnerability within the browser’s Compositing system, poses vital dangers to customers who haven’t but up to date their browsers. 

Safety researchers warn that these flaws may very well be exploited to realize management of affected programs, doubtlessly resulting in information theft, set up of malware, or additional system compromise. 

Customers are strongly suggested to replace their Chrome installations instantly to model 137.0.7151.40/.41 for Home windows and Mac.

Excessive-Severity Safety Flaw Found in Chrome Browser

On Wednesday, Could 21, 2025, Google launched an early secure replace to handle eight safety vulnerabilities within the Chrome browser. 

The replace was initially rolled out to a small share of customers as a part of Google’s phased deployment technique, however given the severity of the failings, safety consultants advocate that every one customers replace instantly. 

Essentially the most important difficulty, CVE-2025-5063, is a “Use after free” vulnerability within the Compositing system, which handles how Chrome renders visible components on net pages.

Google’s safety crew assigned the difficulty a “excessive” severity ranking, indicating its potential for vital hurt if exploited.

This vulnerability may doubtlessly enable attackers to execute malicious code remotely by tricking customers into visiting specifically crafted web sites.

Use-after-free vulnerabilities are notably harmful as they contain manipulating reminiscence after it has been freed, doubtlessly permitting attackers to execute arbitrary code. 

Google’s push of an early secure launch signifies the urgency of this safety patch, as the corporate usually reserves such actions for important safety points that could be actively exploited within the wild.

Medium and Low Severity Vulnerabilities

Extra vulnerabilities mounted on this replace embrace:

CVE-2025-5064: Maurice Dauer reported a medium-severity inappropriate implementation in Background Fetch, permitting attackers to bypass safety checks for background downloads. This flaw may allow malicious actors to control obtain processes or abuse browser APIs, risking information integrity. Google awarded a $4,000 bounty for this reported difficulty.

CVE-2025-5065: This medium-severity flaw within the FileSystemAccess API stemmed from improper permission controls, reported by NDevTK in 2022, incomes a $2000 reward. Exploiting it may let malicious web sites entry or modify native information with out person consent.

CVE-2025-5066: Found by Mohit Raj (shadow2639), this medium-severity difficulty in Chrome’s Messages part concerned flawed coverage enforcement. It may enable attackers to intercept or manipulate browser-to-user communications, doubtlessly resulting in information leaks. A $1,000 bounty was issued for this 2024-reported vulnerability.

CVE-2025-5067: A low-severity inappropriate implementation within the Tab Strip UI, reported by Khalil Zhani in 2023, risked phishing assaults by way of tab spoofing. 

Although much less important, it highlighted UI-level vulnerabilities that would mislead customers. Google awarded $500 for this discovering.

The safety bulletin famous that “entry to bug particulars and hyperlinks could also be stored restricted till a majority of customers are up to date with a repair,” suggesting Google is taking precautions to forestall widespread exploitation of those vulnerabilities.

Learn how to Replace Your Chrome Browser

Updating Chrome is a simple course of that gives quick safety towards these safety threats. To replace Chrome:

Click on the three-dot menu within the upper-right nook of Chrome.

Navigate to Assist > About Google Chrome.

Chrome will robotically verify for and set up any obtainable updates.

Confirm your Chrome model is 137.0.7151.40 or 137.0.7151.41 (for Home windows and Mac).

Restart the browser to finish the replace course of.

Safety consultants advocate enabling automated updates for browsers and all software program to make sure well timed safety towards newly found vulnerabilities. 

Moreover, customers must be cautious when visiting unfamiliar web sites and keep away from clicking on suspicious hyperlinks or downloading information from untrusted sources.

Google’s safety crew and exterior researchers who reported these vulnerabilities via the Chrome Vulnerability Reward Program proceed to watch for potential exploits.

Equip your SOC crew with deep menace evaluation for sooner response -> Get Additional Sandbox Licenses for Free

Cyber Security News Tags:Attackers, Chrome, Code, Execute, Malicious, Remotely, Vulnerabilities

Post navigation

Previous Post: Identity Security Has an Automation Problem—And It’s Bigger Than You Think
Next Post: Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host

Related Posts

New Vulnerability Affects All Intel Processors From The Last 6 Years Cyber Security News
ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats Cyber Security News
New Weaponized PyPI Package Attacking Developers to Steal Source Code Cyber Security News
SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack Cyber Security News
Printer Company Offered Malicious Drivers Infected With XRed Malware Cyber Security News
Microsoft Defender Vulnerability Allows Attackers to Elevate Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Secure Your Linux Server
  • How to Secure Your IoT Devices at Home
  • CefSharp Enumeration Tool Reveals Security Vulnerabilities in .NET Desktop Apps
  • Gujarat Teen Behind 50+ Cyberattacks During ‘Operation Sindoor’ Arrested
  • Akamai, Microsoft Disagree on Severity of Unpatched ‘BadSuccessor’ Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • How to Secure Your Linux Server
  • How to Secure Your IoT Devices at Home
  • CefSharp Enumeration Tool Reveals Security Vulnerabilities in .NET Desktop Apps
  • Gujarat Teen Behind 50+ Cyberattacks During ‘Operation Sindoor’ Arrested
  • Akamai, Microsoft Disagree on Severity of Unpatched ‘BadSuccessor’ Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News