Google has launched Chrome model 142.0.7444.162/.163 to handle a high-severity safety vulnerability within the V8 JavaScript engine.
The steady channel replace is now rolling out throughout Home windows, Mac, and Linux platforms over the approaching days and weeks.
The safety repair addresses CVE-2025-13042, categorised as a “Excessive” severity vulnerability involving an inappropriate implementation in V8, Chrome’s core JavaScript engine. The vulnerability was reported on November 3, 2025, by a safety researcher with the alias 303f06e3.
This situation might permit attackers to take advantage of the V8 engine by specifically crafted JavaScript code.
Chrome Safety Replace
The model 142.0.7444.162/.163 launch consists of one confirmed safety repair addressing the V8 engine flaw.
Google maintains a complete checklist of all adjustments on this construct on their Chromium supply repository for customers who need detailed technical details about the replace, and deploys it step by step throughout all supported platforms.
CVE IDSeverityComponentIssue TypeAffected VersionsCVE-2025-13042HighV8 EngineInappropriate ImplementationChrome
Customers might not see the replace instantly, as Google usually releases it over days or perhaps weeks to observe stability and guarantee no new points emerge throughout the rollout course of.
Google continues to focus on the contributions of exterior safety researchers who responsibly establish and report vulnerabilities.
The corporate makes use of a number of detection instruments, together with AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Management Circulate Integrity, libFuzzer, and AFL, to catch safety bugs earlier than they attain customers.
Whereas the rollout is computerized for many Chrome customers, it’s advisable that you simply guarantee your browser is updated.
Customers can confirm their present model in Chrome settings beneath “About Chrome,” which mechanically checks for and installs accessible updates.
Google restricts detailed details about safety vulnerabilities till nearly all of customers obtain patches. This accountable disclosure strategy prevents attackers from exploiting identified points whereas fixes are being deployed.
Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.
