Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11206: Heap buffer overflow in Google Chrome

0
High
VulnerabilityCVE-2025-11206cvecve-2025-11206
Published: Thu Nov 06 2025 (11/06/2025, 22:08:53 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Heap buffer overflow in Video in Google Chrome prior to 141.0.7390.54 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 22:12:05 UTC

Technical Analysis

CVE-2025-11206 is a heap buffer overflow vulnerability identified in the video processing component of Google Chrome versions before 141.0.7390.54. This vulnerability arises when Chrome improperly handles video data, leading to a heap overflow condition. An attacker can exploit this by delivering a specially crafted HTML page containing malicious video content, which triggers the overflow. The consequence of this overflow is a potential sandbox escape, allowing the attacker to execute arbitrary code with elevated privileges outside the browser's restricted environment. This type of vulnerability is particularly dangerous because the sandbox is a critical security boundary designed to isolate web content from the underlying operating system. The CVSS v3.1 base score of 7.1 reflects the vulnerability's high severity, with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction (such as visiting a malicious webpage). The scope is changed, indicating that the impact extends beyond the vulnerable component to the broader system. The confidentiality, integrity, and availability impacts are all rated low to moderate but combined with sandbox escape potential, the overall risk is significant. No public exploits have been observed yet, but the vulnerability is already published and should be addressed urgently. The lack of patch links in the provided data suggests that the fixed version is 141.0.7390.54, and users should upgrade to this or later versions. This vulnerability affects all platforms where Chrome is used, including Windows, macOS, and Linux.

Potential Impact

The primary impact of CVE-2025-11206 is the potential for a remote attacker to escape the Chrome sandbox, which is a critical security boundary. Successful exploitation could allow attackers to execute arbitrary code on the host system with the privileges of the user running Chrome. This can lead to unauthorized access to sensitive data, modification or corruption of data, and disruption of system availability. Organizations relying heavily on Chrome for web access, especially those handling sensitive or classified information, face increased risk of data breaches and system compromise. The vulnerability's remote nature and low complexity make it attractive for attackers to exploit, particularly in targeted attacks or drive-by download scenarios. Although no known exploits are currently in the wild, the publication of this vulnerability may prompt attackers to develop exploits rapidly. The impact extends across all sectors using Chrome, including government, finance, healthcare, and critical infrastructure, potentially leading to significant operational and reputational damage.

Mitigation Recommendations

To mitigate CVE-2025-11206, organizations should immediately update Google Chrome to version 141.0.7390.54 or later, where the vulnerability is patched. Beyond patching, organizations should implement network-level protections such as web filtering to block access to untrusted or suspicious websites that could host malicious HTML content. Employing endpoint detection and response (EDR) solutions can help detect anomalous behaviors indicative of sandbox escapes or code execution attempts. Administrators should enforce the principle of least privilege for user accounts to limit the impact of any successful exploit. Additionally, disabling or restricting video playback features in Chrome via group policies or browser configurations can reduce the attack surface if immediate patching is not feasible. Regularly monitoring threat intelligence feeds for any emerging exploits related to this CVE is also recommended. Finally, educating users about the risks of visiting untrusted websites and the importance of prompt browser updates will help reduce exploitation likelihood.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2025-09-30T21:50:11.472Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690d1f60a155e591f58b657e

Added to database: 11/6/2025, 10:21:20 PM

Last enriched: 2/26/2026, 10:12:05 PM

Last updated: 3/22/2026, 3:41:35 PM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses