Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11460: Use after free in Google Chrome

0
High
VulnerabilityCVE-2025-11460cvecve-2025-11460
Published: Thu Nov 06 2025 (11/06/2025, 22:26:49 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Use after free in Storage in Google Chrome prior to 141.0.7390.65 allowed a remote attacker to execute arbitrary code via a crafted video file. (Chromium security severity: High)

AI-Powered Analysis

AILast updated: 11/13/2025, 23:38:51 UTC

Technical Analysis

CVE-2025-11460 is a use-after-free vulnerability identified in the Storage component of Google Chrome versions prior to 141.0.7390.65. The flaw occurs when Chrome processes specially crafted video files, leading to improper memory management where a previously freed memory object is accessed. This condition can be exploited by a remote attacker to execute arbitrary code within the context of the victim's browser process. The vulnerability does not require any privileges or prior authentication but does require user interaction, such as opening or previewing a malicious video file. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with an attack vector of network, low attack complexity, no privileges required, and user interaction needed. The vulnerability is significant due to Chrome's dominant market share globally, including Europe, and the potential for attackers to compromise systems remotely. No public exploits have been reported yet, but the risk remains high given the nature of the flaw and the common use of video content on the web. The vulnerability was publicly disclosed on November 6, 2025, with no patch links provided in the data, indicating that organizations must verify patch availability from official Google sources. The flaw is categorized under use-after-free, a common and dangerous class of memory corruption bugs that often lead to remote code execution.

Potential Impact

European organizations face considerable risk from CVE-2025-11460 due to the widespread use of Google Chrome as a primary web browser. Successful exploitation could allow attackers to execute arbitrary code remotely, potentially leading to full system compromise, data theft, or disruption of services. This is particularly critical for sectors handling sensitive data such as finance, healthcare, government, and critical infrastructure. The vulnerability's ability to impact confidentiality, integrity, and availability means attackers could exfiltrate sensitive information, alter data, or cause denial of service. The requirement for user interaction (opening a malicious video) means phishing or social engineering campaigns could be effective attack vectors. Given the high connectivity and digital reliance of European enterprises, this vulnerability could facilitate lateral movement within networks and persistent footholds if exploited. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as exploit development could follow disclosure. Organizations with remote or hybrid workforces using Chrome on various devices are particularly vulnerable.

Mitigation Recommendations

1. Immediately verify and apply the official Google Chrome update to version 141.0.7390.65 or later as soon as it becomes available. 2. Implement network-level controls to block or scan video files from untrusted sources, especially in email attachments and web downloads. 3. Educate users about the risks of opening unsolicited or suspicious video files and encourage cautious behavior regarding unknown media content. 4. Employ endpoint protection solutions capable of detecting exploitation attempts related to use-after-free vulnerabilities. 5. Use browser security features such as sandboxing and site isolation to limit the impact of potential exploitation. 6. Monitor network and endpoint logs for unusual activity indicative of exploitation attempts, including anomalous process behavior or memory corruption alerts. 7. Restrict or disable automatic video playback in browsers where feasible to reduce the risk of inadvertent triggering of the vulnerability. 8. Maintain an up-to-date inventory of Chrome versions deployed across the organization to ensure timely patch management. 9. Coordinate with IT and security teams to prepare incident response plans specifically addressing browser-based remote code execution attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2025-10-07T18:33:19.131Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690d258d790724a13ccd5537

Added to database: 11/6/2025, 10:47:42 PM

Last enriched: 11/13/2025, 11:38:51 PM

Last updated: 11/22/2025, 6:44:13 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats