CVE-2025-12725: Out of bounds read in Google Chrome
Out of bounds read in WebGPU in Google Chrome on Android prior to 142.0.7444.137 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
AI Analysis
Technical Summary
CVE-2025-12725 is a vulnerability identified in the WebGPU implementation of Google Chrome on Android platforms prior to version 142.0.7444.137. The flaw is an out-of-bounds read that can be triggered by a remote attacker through a specially crafted HTML page. This out-of-bounds read leads to an out-of-bounds memory write, which can corrupt memory and potentially allow arbitrary code execution or data leakage. The vulnerability does not require any privileges or authentication but does require user interaction, such as visiting a malicious or compromised website. The WebGPU API is designed to provide high-performance graphics and computation capabilities in web browsers, and a flaw here can have significant security implications. The CVSS v3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with an attack vector over the network, low attack complexity, no privileges required, and user interaction needed. Although no exploits have been reported in the wild yet, the severity and ease of exploitation make this a critical vulnerability to address promptly. The vulnerability was publicly disclosed on November 10, 2025, and Google has released a patched version of Chrome (142.0.7444.137) to remediate the issue.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the widespread use of Google Chrome on Android devices. Exploitation could lead to unauthorized data access, execution of arbitrary code, or denial of service, impacting confidentiality, integrity, and availability of sensitive information and services. Sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on mobile web access are particularly vulnerable. The potential for remote exploitation without authentication increases the threat surface, especially in environments where users frequently browse untrusted or external websites. Additionally, the vulnerability could be leveraged as a foothold for further network intrusion or lateral movement within corporate environments. The absence of known exploits in the wild currently provides a window for mitigation, but the high CVSS score underscores the urgency for patching.
Mitigation Recommendations
Organizations should immediately ensure all Android devices are updated to Google Chrome version 142.0.7444.137 or later. Implement mobile device management (MDM) solutions to enforce browser updates and restrict installation of outdated or unapproved applications. Employ web filtering and URL reputation services to block access to potentially malicious or untrusted websites that could host crafted HTML pages exploiting this vulnerability. Educate users about the risks of interacting with unknown or suspicious web content, emphasizing cautious browsing behavior. For high-risk environments, consider disabling or restricting WebGPU functionality via browser policies or configurations until patches are fully deployed. Monitor network traffic for unusual patterns indicative of exploitation attempts and maintain up-to-date endpoint detection and response (EDR) tools capable of identifying memory corruption exploits. Finally, maintain an incident response plan tailored to web-based exploitation scenarios.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland
CVE-2025-12725: Out of bounds read in Google Chrome
Description
Out of bounds read in WebGPU in Google Chrome on Android prior to 142.0.7444.137 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
AI-Powered Analysis
Technical Analysis
CVE-2025-12725 is a vulnerability identified in the WebGPU implementation of Google Chrome on Android platforms prior to version 142.0.7444.137. The flaw is an out-of-bounds read that can be triggered by a remote attacker through a specially crafted HTML page. This out-of-bounds read leads to an out-of-bounds memory write, which can corrupt memory and potentially allow arbitrary code execution or data leakage. The vulnerability does not require any privileges or authentication but does require user interaction, such as visiting a malicious or compromised website. The WebGPU API is designed to provide high-performance graphics and computation capabilities in web browsers, and a flaw here can have significant security implications. The CVSS v3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with an attack vector over the network, low attack complexity, no privileges required, and user interaction needed. Although no exploits have been reported in the wild yet, the severity and ease of exploitation make this a critical vulnerability to address promptly. The vulnerability was publicly disclosed on November 10, 2025, and Google has released a patched version of Chrome (142.0.7444.137) to remediate the issue.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the widespread use of Google Chrome on Android devices. Exploitation could lead to unauthorized data access, execution of arbitrary code, or denial of service, impacting confidentiality, integrity, and availability of sensitive information and services. Sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on mobile web access are particularly vulnerable. The potential for remote exploitation without authentication increases the threat surface, especially in environments where users frequently browse untrusted or external websites. Additionally, the vulnerability could be leveraged as a foothold for further network intrusion or lateral movement within corporate environments. The absence of known exploits in the wild currently provides a window for mitigation, but the high CVSS score underscores the urgency for patching.
Mitigation Recommendations
Organizations should immediately ensure all Android devices are updated to Google Chrome version 142.0.7444.137 or later. Implement mobile device management (MDM) solutions to enforce browser updates and restrict installation of outdated or unapproved applications. Employ web filtering and URL reputation services to block access to potentially malicious or untrusted websites that could host crafted HTML pages exploiting this vulnerability. Educate users about the risks of interacting with unknown or suspicious web content, emphasizing cautious browsing behavior. For high-risk environments, consider disabling or restricting WebGPU functionality via browser policies or configurations until patches are fully deployed. Monitor network traffic for unusual patterns indicative of exploitation attempts and maintain up-to-date endpoint detection and response (EDR) tools capable of identifying memory corruption exploits. Finally, maintain an incident response plan tailored to web-based exploitation scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Chrome
- Date Reserved
- 2025-11-04T21:56:36.204Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6912465d941466772c506b49
Added to database: 11/10/2025, 8:09:01 PM
Last enriched: 11/20/2025, 6:56:20 PM
Last updated: 11/22/2025, 7:35:20 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11186: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in humanityco Cookie Notice & Compliance for GDPR / CCPA
MediumCVE-2025-2609: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in MagnusSolution MagnusBilling
HighCVE-2024-9643: CWE-489 Active Debug Code in Four-Faith F3x36
CriticalCVE-2025-65947: CWE-400: Uncontrolled Resource Consumption in jzeuzs thread-amount
HighCVE-2025-65946: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in RooCodeInc Roo-Code
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.