Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chrome 136 Update Patches Vulnerability With ‘Exploit in the Wild’

Posted on May 15, 2025May 15, 2025 By CWS

Google on Wednesday introduced the discharge of a Chrome 136 replace that resolves 4 vulnerabilities, warning that an exploit exists within the wild for considered one of them.

The problem, tracked as CVE-2025-4664, is likely one of the two bugs reported by exterior researchers that have been resolved on this Chrome replace.

With out offering technical particulars, Google describes the flaw as an “inadequate coverage enforcement situation in Loader”.

In keeping with a NIST advisory, the safety defect could possibly be exploited by a distant attacker “to leak cross-origin knowledge through a crafted HTML web page”.

“Google is conscious of studies that an exploit for CVE-2025-4664 exists within the wild,” Google notes in its advisory.

This phrasing is usually utilized by Google when a Chrome vulnerability has been exploited in malicious assaults, but it surely’s unclear if on this case the corporate is conscious of precise zero-day exploitation or if it’s solely referring to an exploit being publicly accessible. 

The web large realized of the vulnerability after safety researcher Vsevolod Kokorin (Slonser) posted info on X (previously Twitter).

In a sequence of posts on Might 5, Slonser defined that an attacker might modify the Hyperlink header that Chrome resolves on sub-resource requests to seize question parameters containing delicate info.Commercial. Scroll to proceed studying.

“Builders hardly ever contemplate the opportunity of stealing question parameters through a picture from a Third-party useful resource – which makes this trick surprisingly helpful typically,” the researcher famous.

The second externally reported situation addressed in Chrome 136 is tracked as CVE-2025-4609 and is described as a high-severity “incorrect deal with supplied in unspecified circumstances in Mojo”.

The most recent Chrome iteration is now rolling out as variations 136.0.7103.113/.114 for Home windows and macOS, and as model 136.0.7103.113 for Linux.

Customers are suggested to replace their browsers as quickly as doable. It’s not unusual for risk actors to focus on Chrome vulnerabilities rapidly after exploits are publicly launched.

Associated: Chrome 136, Firefox 138 Patch Excessive-Severity Vulnerabilities

Associated: Chrome 135, Firefox 137 Updates Patch Extreme Vulnerabilities

Associated: Chrome 135, Firefox 137 Patch Excessive-Severity Vulnerabilities

Associated: Firefox Affected by Flaw Much like Chrome Zero-Day Exploited in Russia

Security Week News Tags:Chrome, Exploit, Patches, Update, Vulnerability, Wild

Post navigation

Previous Post: Healthcare Cyber Attacks – 276 Million Patient Records were Compromised In 2024
Next Post: Australian Human Rights Commission Discloses Data Breach

Related Posts

Hackers Earn Over $1 Million at Pwn2Own Berlin 2025 Security Week News
Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance Spyware Security Week News
Orca Snaps Up Opus in Cloud Security Automation Push Security Week News
Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday Security Week News
Production at Steelmaker Nucor Disrupted by Cyberattack Security Week News
Possible Zero-Day Patched in SonicWall SMA Appliances Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News