Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5274: Type Confusion in Google Chrome

0
High
VulnerabilityCVE-2024-5274cvecve-2024-5274
Published: Tue May 28 2024 (05/28/2024, 14:44:31 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Type Confusion in V8 in Google Chrome prior to 125.0.6422.112 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:35:27 UTC

Technical Analysis

CVE-2024-5274 is a type confusion vulnerability identified in the V8 JavaScript engine component of Google Chrome prior to version 125.0.6422.112. Type confusion occurs when the program incorrectly interprets the type of an object, leading to unexpected behavior. In this case, the flaw allows a remote attacker to execute arbitrary code inside the browser's sandbox environment by delivering a crafted HTML page that exploits the vulnerability during JavaScript execution. The vulnerability is classified under CWE-843 (Type Confusion), which often results in memory corruption issues such as use-after-free or out-of-bounds access. Exploitation requires no prior privileges but does require user interaction, such as visiting a malicious website. The CVSS 3.1 base score is 8.3, reflecting high severity due to the network attack vector, high impact on confidentiality, integrity, and availability, and the complexity requiring user interaction and high attack complexity. Although no public exploits are currently known, the vulnerability poses a significant risk given Chrome's widespread use. The flaw was publicly disclosed on May 28, 2024, and Google has released a patched version to address the issue. This vulnerability highlights the critical importance of timely browser updates and vigilant web security practices.

Potential Impact

The impact of CVE-2024-5274 is substantial for organizations globally, as it enables remote code execution within the sandboxed environment of Google Chrome. Successful exploitation can lead to unauthorized access to sensitive information, compromise of browser integrity, and potential pivoting to further system-level attacks. Since Chrome is one of the most widely used browsers worldwide, the vulnerability affects a broad user base including enterprises, government agencies, and individual users. Attackers could leverage this flaw to deploy malware, steal credentials, or conduct espionage. The requirement for user interaction (visiting a malicious page) means phishing or drive-by download attacks could be vectors. The vulnerability’s high CVSS score indicates a severe threat that could disrupt business operations, cause data breaches, and undermine trust in web security. Organizations relying heavily on Chrome for daily operations must consider this vulnerability a critical risk until patched.

Mitigation Recommendations

To mitigate CVE-2024-5274, organizations should immediately update Google Chrome to version 125.0.6422.112 or later, where the vulnerability is patched. Beyond patching, organizations should implement strict browser security policies such as disabling or restricting JavaScript execution on untrusted sites using Content Security Policy (CSP). Employing browser isolation technologies can limit the impact of potential exploitation by sandboxing browser processes further. User education to recognize phishing attempts and avoid clicking on suspicious links is essential to reduce the risk of user interaction-based exploits. Network-level protections such as web filtering and intrusion prevention systems should be configured to block access to known malicious domains. Monitoring browser behavior for anomalies and integrating endpoint detection and response (EDR) solutions can help detect exploitation attempts. Regular vulnerability scanning and timely patch management processes are critical to prevent exploitation of similar vulnerabilities in the future.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Chrome
Date Reserved
2024-05-23T16:20:01.486Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b6247d717aace26c5f

Added to database: 10/21/2025, 7:06:30 PM

Last enriched: 2/28/2026, 3:35:27 AM

Last updated: 3/22/2026, 12:10:43 AM

Views: 224

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses