Home » Google patches third zero-day flaw in Chrome this year

Google patches third zero-day flaw in Chrome this year

by Samantha Rowland
2 minutes read

Google’s Chrome browser, well-known for its robust security features, recently faced its third zero-day vulnerability this year. This flaw, identified as CVE-2025-5419, prompted the Google Chrome team to swiftly release an update to patch the issue. This vulnerability, a high-severity one, was actively exploited in the wild before the patch was deployed.

Zero-day vulnerabilities in Chrome are highly sought after in the cyber black market due to the browser’s strong security measures like process sandboxes. These defenses make it challenging for attackers to execute remote code on a system through Chrome. The complexity involved in bypassing these security layers often requires chaining multiple vulnerabilities together, making successful exploits quite valuable.

The recent zero-day flaw, CVE-2025-5419, was fixed in the Chrome 137.0.7151.68/.69 version for Windows and Mac, and 137.0.7151.68 version for Linux. This incident marks the third zero-day flaw addressed in Chrome this year, following CVE-2025-2783 and CVE-2025-4664, patched in March and May respectively. Despite Chrome’s strong defenses, hackers persist in targeting Chrome users, demonstrating the ongoing interest in compromising the browser.

The discovery of this vulnerability was credited to Google’s Threat Analysis Group, responsible for safeguarding Google’s infrastructure and users against government-backed threats. While the specifics of how the vulnerability was uncovered remain undisclosed, its high severity rating indicates that, on its own, it cannot lead to remote code execution on the underlying OS and likely requires additional vulnerabilities to do so.

The vulnerability in question affects Chrome’s JavaScript and WebAssembly engine, V8, with the exploit involving an out-of-bounds memory read and write. Since V8 is an open-source engine used in various projects, including Node.js, the exploit can potentially be triggered remotely when users visit websites that load malicious code.

In addition to addressing CVE-2025-5419, the Chrome update also resolves a medium-severity use-after-free memory bug in Blink, the browser’s rendering engine. This bug was reported by a researcher who received a $1,000 bounty for their contribution to enhancing Chrome’s security.

Google Chrome users are encouraged to ensure their browsers are updated promptly. While Chrome typically updates automatically, users can manually trigger an update check by navigating to the Help > About Google Chrome menu. Staying vigilant and proactive in updating software is crucial in mitigating security risks and safeguarding against potential threats.

In conclusion, the recent patch to address the third zero-day vulnerability in Chrome this year underscores the ongoing efforts to enhance browser security and protect users from evolving cyber threats. By promptly addressing and patching vulnerabilities, the Chrome team aims to provide a secure browsing experience for its users amidst a landscape of increasing cybersecurity challenges.

You may also like