Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Google Chrome 0-Day Vulnerability Exploited in the Wild

Posted on May 15, 2025May 15, 2025 By CWS

Google has launched an pressing safety replace for Chrome to patch a crucial vulnerability that hackers are actively exploiting within the wild.

The tech big introduced yesterday that Chrome’s Steady channel has been up to date to model 136.0.7103.113/.114 for Home windows and Mac, and 136.0.7103.113 for Linux to deal with 4 safety points, together with a high-severity zero-day flaw.

Safety researchers have recognized CVE-2025-4664 as probably the most severe vulnerability on this launch. This vulnerability stems from “inadequate coverage enforcement in Loader” inside Chrome’s browser structure.

This flaw permits attackers to bypass safety insurance policies, probably enabling unauthorized code execution and cross-origin knowledge leaks by means of specifically crafted HTML pages.

“The flaw permits an attacker to bypass safety insurance policies inside Chrome’s Loader logic, probably resulting in unauthorized code execution or sandbox escape,” defined safety consultants monitoring the problem.

Google Chrome 0-Day Vulnerability

Google confirmed they’re “conscious of stories that an exploit for CVE-2025-4664 exists within the wild,” elevating the urgency for customers to replace instantly.

The vulnerability was initially disclosed through an X submit by safety researcher @slonser_ on Could 5, 2025, indicating that malicious actors might have been exploiting the flaw for days or perhaps weeks earlier than the patch was launched.

Google has not disclosed particular particulars about ongoing exploitation makes an attempt, prone to stop additional abuse whereas customers replace their browsers.

Along with the zero-day vulnerability, the Chrome replace addresses one other high-severity flaw, CVE-2025-4609, which includes “incorrect deal with supplied in unspecified circumstances in Mojo”.

Safety researchers clarify that bugs in Chrome’s Mojo IPC (Inter-Course of Communication) layer can result in severe points like privilege escalation and reminiscence corruption in advanced, multi-process functions like Chrome.

Chrome’s safety staff credited exterior researchers, together with @slonser_ and a researcher named Micky who reported the Mojo vulnerability on April 22, for figuring out these safety points.

Google’s ongoing inside safety efforts, together with instruments like AddressSanitizer, which have discovered over 300 bugs in Chromium, proceed to strengthen Chrome’s safety posture.

Customers can confirm their Chrome model and set off an replace by navigating to “chrome://settings/assist” of their browser. The replace will roll out routinely over the approaching days and weeks, however safety consultants advocate manually checking for updates given the crucial nature of this vulnerability.

The newest variations customers ought to guarantee they’ve put in are Chrome 136.0.7103.113/.114 for Home windows/Mac and Chrome 136.0.7103.113 for Linux. Android customers will obtain Chrome 136.0.7103.125 by means of Google Play, which incorporates the identical safety fixes because the desktop variations.

This incident highlights the continuing safety challenges confronted by net browsers that course of untrusted content material from the web.

Chrome maintains its place because the world’s hottest browser with roughly 65% market share throughout all platforms, making it a lovely goal for malicious actors.

Google continues to incentivize safety researchers to seek out and report vulnerabilities by means of its bug bounty program, with rewards of as much as $250,000 for locating crucial safety flaws.

The corporate’s proactive method to safety, together with fast patch deployment and clear disclosure of vulnerabilities, stays essential in defending billions of customers worldwide.

Vulnerability Assault Simulation on How Hackers Quickly Probe Web sites for Entry Factors – Free Webinar

Cyber Security News Tags:0Day, Chrome, Exploited, Google, Vulnerability, Wild

Post navigation

Previous Post: Authorities Arrested 17 Criminal Bankers, EUR 4.5 Million Seized
Next Post: New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy

Related Posts

Hands-on Cybersecurity Threat Hunting Guide for SOC Analysts and MSSPs Cyber Security News
Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users Cyber Security News
Threat Actors Using ViperSoftX Malware to Exfiltrate Sensitive Details Cyber Security News
AI Crawlers Reshape The Internet With Over 30% of Global Web Traffic Cyber Security News
Researchers Uncovered on How Russia Leverages Private Companies, Hacktivist to Strengthen Cyber Capabilities Cyber Security News
Authorities Dismantled AVCheck, a Tool For Testing Malware Against Antivirus Detection Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News