Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10501: Use after free in Google Chrome

0
High
VulnerabilityCVE-2025-10501cvecve-2025-10501
Published: Wed Sep 24 2025 (09/24/2025, 16:17:12 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Use after free in WebRTC in Google Chrome prior to 140.0.7339.185 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 22:08:56 UTC

Technical Analysis

CVE-2025-10501 is a use-after-free vulnerability identified in the WebRTC implementation of Google Chrome versions prior to 140.0.7339.185. WebRTC (Web Real-Time Communication) is a widely used technology enabling peer-to-peer audio, video, and data sharing directly between browsers without plugins. The vulnerability arises when the browser improperly manages memory, freeing an object while it is still accessible, leading to heap corruption. An attacker can exploit this by delivering a specially crafted HTML page that triggers the use-after-free condition, potentially allowing arbitrary code execution within the context of the browser process. The vulnerability has a CVSS v3.1 base score of 8.8, reflecting high impact on confidentiality, integrity, and availability, with an attack vector over the network, no privileges required, but requiring user interaction (e.g., visiting a malicious webpage). The scope is unchanged, meaning the vulnerability affects only the vulnerable component without extending beyond the browser sandbox. Although no known exploits are currently reported in the wild, the nature of the flaw and its high severity make it a critical risk for users of affected Chrome versions. The vulnerability was publicly disclosed on September 24, 2025, and Google has released a patched version (140.0.7339.185) to address the issue. Due to WebRTC's integral role in modern web communications, this vulnerability poses a significant threat to users relying on real-time communication features in Chrome.

Potential Impact

The exploitation of CVE-2025-10501 can lead to severe consequences for organizations and individual users worldwide. Successful exploitation allows remote attackers to execute arbitrary code within the browser context, potentially leading to full system compromise if sandbox escapes are chained. This threatens the confidentiality of sensitive data accessed via the browser, the integrity of system and application processes, and the availability of services due to potential crashes or denial-of-service conditions. Organizations relying on Chrome for web-based communications, especially those using WebRTC for conferencing, telephony, or real-time data exchange, face increased risk of targeted attacks or widespread exploitation. The vulnerability could be leveraged for espionage, data theft, or disruption of critical business operations. Given Chrome's dominant market share globally, the scope of impact is extensive, affecting enterprises, governments, and consumers alike. The requirement for user interaction (visiting a malicious webpage) lowers the barrier for exploitation but also provides an opportunity for mitigation through user awareness and technical controls.

Mitigation Recommendations

To effectively mitigate CVE-2025-10501, organizations should implement the following specific measures: 1) Immediately update Google Chrome to version 140.0.7339.185 or later, where the vulnerability is patched. 2) Employ enterprise browser management tools to enforce automatic updates and prevent use of outdated versions. 3) Restrict or monitor WebRTC usage in environments where it is not essential, using browser policies or network-level controls to limit exposure. 4) Deploy web content filtering and URL reputation services to block access to known malicious sites that could host exploit pages. 5) Educate users about the risks of visiting untrusted websites and the importance of applying browser updates promptly. 6) Consider using browser sandboxing or isolation technologies to contain potential exploitation impacts. 7) Monitor security advisories and threat intelligence feeds for any emerging exploit activity related to this vulnerability. These targeted actions go beyond generic patching advice by focusing on controlling WebRTC exposure and enhancing organizational update policies.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Chrome
Date Reserved
2025-09-16T02:25:45.979Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68d41b0baa6112407a6d8661

Added to database: 9/24/2025, 4:23:39 PM

Last enriched: 2/26/2026, 10:08:56 PM

Last updated: 3/23/2026, 9:40:57 PM

Views: 535

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses