Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11213: Inappropriate implementation in Google Chrome

0
Unknown
VulnerabilityCVE-2025-11213cvecve-2025-11213
Published: Thu Nov 06 2025 (11/06/2025, 22:08:56 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Inappropriate implementation in Omnibox in Google Chrome on Android prior to 141.0.7390.54 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium)

AI-Powered Analysis

AILast updated: 11/06/2025, 22:29:06 UTC

Technical Analysis

CVE-2025-11213 is a security vulnerability identified in the Omnibox feature of Google Chrome on Android devices running versions prior to 141.0.7390.54. The Omnibox is the combined address and search bar in Chrome, responsible for displaying URLs and search queries. The vulnerability stems from an inappropriate implementation that allows a remote attacker to craft a malicious HTML page which, when visited by a user who performs specific UI gestures, can cause the Omnibox to display a spoofed domain. This domain spoofing can deceive users into believing they are visiting a legitimate website when they are not, increasing the risk of phishing and credential theft. Exploitation requires the attacker to lure the user to the malicious page and convince them to perform certain gestures, indicating user interaction is necessary. No authentication is required to exploit this vulnerability, but the attack vector relies heavily on social engineering. The vulnerability does not currently have a CVSS score, but Chromium has assigned it a medium severity rating. There are no known exploits in the wild at the time of publication. The vulnerability affects only the Android version of Chrome prior to 141.0.7390.54, and Google has presumably released a fixed version in 141.0.7390.54 or later. The lack of a CVSS score limits precise severity quantification, but the nature of domain spoofing combined with user interaction suggests a moderate risk profile.

Potential Impact

For European organizations, the primary impact of CVE-2025-11213 lies in the increased risk of phishing attacks and social engineering campaigns targeting employees and customers using Chrome on Android devices. Successful exploitation could lead to credential theft, unauthorized access to sensitive systems, and potential data breaches. Organizations with mobile-first workforces or those relying heavily on Chrome for Android for accessing corporate resources are particularly vulnerable. The domain spoofing could undermine user trust in legitimate communications and websites, potentially causing reputational damage and financial losses. Since the attack requires user interaction, the impact is somewhat mitigated by user awareness but remains significant given the widespread use of Chrome on Android in Europe. The vulnerability could also be leveraged in targeted attacks against sectors such as finance, government, and critical infrastructure, where phishing is a common initial attack vector. Overall, the threat could disrupt confidentiality and integrity of user credentials and data, though it does not directly impact system availability.

Mitigation Recommendations

European organizations should immediately ensure that all Chrome installations on Android devices are updated to version 141.0.7390.54 or later, where the vulnerability is patched. Mobile device management (MDM) solutions should be used to enforce timely updates and restrict installation of outdated browser versions. User training programs should emphasize caution when interacting with unfamiliar web pages and performing unusual UI gestures, highlighting the risks of domain spoofing. Implementing multi-factor authentication (MFA) can reduce the impact of credential theft resulting from phishing. Organizations should monitor for phishing campaigns exploiting domain spoofing techniques and employ email filtering and web gateway solutions to block malicious URLs. Security teams should review and enhance incident response plans to quickly address potential phishing incidents. Additionally, consider deploying browser security extensions or enterprise policies that limit navigation to trusted domains or warn users about suspicious URLs. Regular security awareness campaigns tailored to mobile device usage can further reduce exploitation likelihood.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2025-09-30T21:50:13.738Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690d1f60a155e591f58b659e

Added to database: 11/6/2025, 10:21:20 PM

Last enriched: 11/6/2025, 10:29:06 PM

Last updated: 11/7/2025, 5:20:51 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats