Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12725: Out of bounds read in Google Chrome

0
High
VulnerabilityCVE-2025-12725cvecve-2025-12725
Published: Mon Nov 10 2025 (11/10/2025, 20:00:54 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Out of bounds read in WebGPU in Google Chrome on Android prior to 142.0.7444.137 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

AILast updated: 11/27/2025, 19:23:26 UTC

Technical Analysis

CVE-2025-12725 is a vulnerability identified in the WebGPU implementation of Google Chrome on Android devices prior to version 142.0.7444.137. The flaw is an out of bounds read that can be manipulated by a remote attacker through a specially crafted HTML page to cause an out of bounds memory write. WebGPU is a web standard designed to provide high-performance graphics and computation capabilities in browsers, and this vulnerability arises from improper bounds checking within this component. The out of bounds write can lead to arbitrary code execution, allowing attackers to compromise the confidentiality, integrity, and availability of the device. The attack vector is remote and requires no privileges or prior authentication, but it does require user interaction, such as visiting a malicious website. The vulnerability has been assigned a CVSS v3.1 base score of 8.8, reflecting its high severity with network attack vector, low attack complexity, no privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. While no exploits have been reported in the wild yet, the potential for exploitation is significant given the widespread use of Chrome on Android devices. The vulnerability was publicly disclosed on November 10, 2025, and Google has released a patched version (142.0.7444.137) to address the issue. Organizations relying on Chrome on Android devices should prioritize patching to mitigate risk.

Potential Impact

The vulnerability poses a critical risk to European organizations using Google Chrome on Android devices. Successful exploitation can lead to arbitrary code execution, enabling attackers to steal sensitive information, manipulate data, or disrupt device functionality. This can compromise corporate data confidentiality, integrity, and availability, potentially leading to data breaches, operational disruptions, and reputational damage. Mobile devices are often used for accessing corporate resources, making this vulnerability a vector for lateral movement or initial compromise. The requirement for user interaction (visiting a malicious webpage) means phishing or drive-by download attacks could be effective. Given the high adoption of Android devices in Europe, especially in sectors with mobile workforces such as finance, healthcare, and government, the impact could be widespread. Additionally, the vulnerability could be leveraged in targeted attacks against high-value European entities or critical infrastructure that rely on mobile Chrome browsers.

Mitigation Recommendations

1. Immediate update of Google Chrome on all Android devices to version 142.0.7444.137 or later to apply the security patch. 2. Implement enterprise mobile device management (MDM) policies to enforce timely browser updates and restrict installation of untrusted applications. 3. Deploy web filtering solutions to block access to known malicious websites and suspicious content that could host exploit pages. 4. Educate users on the risks of clicking unknown links or visiting untrusted websites, emphasizing the need for caution with unsolicited communications. 5. Monitor network traffic for unusual patterns that may indicate exploitation attempts, such as anomalous outbound connections from mobile devices. 6. Consider disabling or restricting WebGPU usage via browser policies if feasible, to reduce the attack surface until patches are fully deployed. 7. Maintain an incident response plan that includes mobile device compromise scenarios to quickly contain and remediate potential breaches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2025-11-04T21:56:36.204Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6912465d941466772c506b49

Added to database: 11/10/2025, 8:09:01 PM

Last enriched: 11/27/2025, 7:23:26 PM

Last updated: 1/7/2026, 4:53:55 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats