Close Menu
globalcrimedesk.comglobalcrimedesk.com
    What's Hot

    Zelenskyy arrives in Turkey for Russia talks, without Putin : NPR

    Black security manager called ‘slave’ by white colleague in London awarded £361,000 | Race

    Malicious NPM package uses Unicode steganography to evade detection

    Facebook X (Twitter) Instagram
    Trending
    • Zelenskyy arrives in Turkey for Russia talks, without Putin : NPR
    • Black security manager called ‘slave’ by white colleague in London awarded £361,000 | Race
    • Malicious NPM package uses Unicode steganography to evade detection
    • Birthright citizenship in court; Trump’s ‘big’ bill : NPR
    • Farage is running a cult, says ex-Reform MP Rupert Lowe
    • Syria: US Lifting Sanctions Will Bolster Rights, Recovery
    • Can President Trump legally accept a $400m plane for free? | Donald Trump News
    • Who is heading up Putin’s ‘theatre prop’ peace delegation in the Turkey talks?
    Facebook X (Twitter) Instagram
    globalcrimedesk.comglobalcrimedesk.com
    • Home
    • Cyber
    • Global
    • Law
    • Mafia
    • Prevention
    • Scandals
    • Terror
    • Trafficking
    globalcrimedesk.comglobalcrimedesk.com
    Home»Cyber»Google fixes high severity Chrome flaw with public exploit
    Cyber

    Google fixes high severity Chrome flaw with public exploit

    mediamillion1000@gmail.comBy [email protected]May 15, 2025No Comments2 Mins Read
    Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
    Follow Us
    Google News Flipboard
    Google fixes high severity Chrome flaw with public exploit
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    Google fixes high severity Chrome flaw with public exploit

    Google has released emergency security updates to patch a high-severity vulnerability in the Chrome web browser that could lead to full account takeover following successful exploitation.

    While it’s unclear if this security flaw has been used in attacks, the company warned that it has a public exploit, which is how it usually hints at active exploitation.

    “Google is aware of reports that an exploit for CVE-2025-4664 exists in the wild,” Google said in a Wednesday security advisory.

    The vulnerability was discovered by Solidlab security researcher Vsevolod Kokorin and is described as an insufficient policy enforcement in Google Chrome’s Loader component that lets remote attackers leak cross-origin data via maliciously crafted HTML pages.

    “You probably know that unlike other browsers, Chrome resolves the Link header on subresource requests. But what’s the problem? The issue is that the Link header can set a referrer-policy. We can specify unsafe-url and capture the full query parameters,” Kokorin explained.

    “Query parameters can contain sensitive data – for example, in OAuth flows, this might lead to an Account Takeover. Developers rarely consider the possibility of stealing query parameters via an image from a 3rd-party resource.”

    Leaked OAuth access token
    Leaked OAuth access token (Vsevolod Kokorin)

    ​Google fixed the flaw for users in the Stable Desktop channel, with patched versions (136.0.7103.113 for Windows/Linux and 136.0.7103.114 for macOS) rolling out to users worldwide.

    Although the company says the security updates will roll out over the coming days and weeks, they were immediately available when BleepingComputer checked for updates.

    Users who don’t want to update Chrome manually can also let the browser automatically check for new updates and install them after the next launch.

    In March, ​Google also fixed a high-severity Chrome zero-day bug (CVE-2025-2783) that was abused to deploy malware in espionage attacks targeting Russian government organizations, media outlets, and educational institutions.

    Kaspersky researchers who discovered the actively exploited zero-day said that the attackers use CVE-2025-2783 exploits to bypass Chrome sandbox protections and infect targets with malware.

    Last year, Google patched 10 zero-days disclosed during the Pwn2Own hacking competition or exploited in attacks.

    Red Report 2025

    Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

    Chrome exploit fixes flaw Google High Public severity
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    Previous ArticleThe Risk of War in the Taiwan Strait Is High—and Getting Higher
    Next Article Houthis Mainstreamed by Russian-Aligned Influencers’ Campaign
    [email protected]
    • Website

    Related Posts

    Malicious NPM package uses Unicode steganography to evade detection

    May 15, 2025

    Snowflake CISO talks lessons learned from breaches, improv • The Register

    May 15, 2025

    Stealth RAT uses a PowerShell loader for fileless attacks

    May 15, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Posts

    Zelenskyy arrives in Turkey for Russia talks, without Putin : NPR

    Black security manager called ‘slave’ by white colleague in London awarded £361,000 | Race

    Malicious NPM package uses Unicode steganography to evade detection

    Birthright citizenship in court; Trump’s ‘big’ bill : NPR

    Trending Posts

    Zelenskyy arrives in Turkey for Russia talks, without Putin : NPR

    May 15, 2025

    Black security manager called ‘slave’ by white colleague in London awarded £361,000 | Race

    May 15, 2025

    Malicious NPM package uses Unicode steganography to evade detection

    May 15, 2025

    Subscribe to News

    Get the latest sports news from NewsSite about world, sports and politics.

    News

    • Cyber
    • Global
    • Law
    • Mafia
    • Prevention

    Company

    • About Us
    • Disclaimer
    • Get In Touch
    • Privacy policy
    • Terms & Condition
    Recent Posts
    • Zelenskyy arrives in Turkey for Russia talks, without Putin : NPR
    • Black security manager called ‘slave’ by white colleague in London awarded £361,000 | Race

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    © 2025 globalcrimedesk. Designed by Pro.
    Facebook X (Twitter) Pinterest Vimeo WhatsApp TikTok Instagram

    Type above and press Enter to search. Press Esc to cancel.