Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13634: Inappropriate implementation in Google Chrome

0
Medium
VulnerabilityCVE-2025-13634cvecve-2025-13634
Published: Tue Dec 02 2025 (12/02/2025, 19:00:12 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Inappropriate implementation in Downloads in Google Chrome on Windows prior to 143.0.7499.41 allowed a local attacker to bypass mark of the web via a crafted HTML page. (Chromium security severity: Medium)

AI-Powered Analysis

AILast updated: 12/02/2025, 19:24:56 UTC

Technical Analysis

CVE-2025-13634 is a security vulnerability identified in Google Chrome on Windows platforms prior to version 143.0.7499.41. The flaw arises from an inappropriate implementation in the Downloads component of Chrome, specifically related to the handling of the mark of the web (MOTW) security feature. MOTW is designed to tag files downloaded from the internet with metadata that enforces security restrictions when those files are opened, such as triggering warnings or sandboxing. This vulnerability allows a local attacker—someone with access to the victim's machine—to craft a malicious HTML page that bypasses the MOTW protections. By doing so, the attacker can cause downloaded files to be treated as if they were from a trusted source, potentially enabling the execution of malicious code or scripts without the usual security prompts or restrictions. The vulnerability does not require remote exploitation or user interaction beyond local access, which limits the attack surface but still poses a risk in environments where local access can be obtained or where users might be tricked into opening crafted HTML files. No public exploits have been reported, and Google has not assigned a CVSS score but classified the severity as medium. The issue was publicly disclosed on December 2, 2025, and fixed in Chrome version 143.0.7499.41. The lack of a CVSS score necessitates an independent severity assessment based on the impact on confidentiality, integrity, and availability, ease of exploitation, and scope of affected systems.

Potential Impact

For European organizations, this vulnerability could lead to the execution of malicious code with fewer security restrictions if an attacker gains local access or convinces a user to open a crafted HTML file. This could compromise sensitive data confidentiality and system integrity, especially in environments with shared or less controlled access to endpoints. The bypass of MOTW may facilitate the spread of malware or unauthorized scripts, increasing the risk of data breaches or system compromise. Organizations subject to strict data protection regulations such as GDPR could face compliance risks if this vulnerability is exploited. The impact is more pronounced in sectors with high security requirements, including finance, healthcare, and government. However, since exploitation requires local access, remote attacks are less likely, reducing the overall threat level but not eliminating it. The absence of known exploits in the wild suggests that immediate risk is moderate but warrants prompt remediation to prevent future exploitation.

Mitigation Recommendations

The primary mitigation is to update Google Chrome on Windows systems to version 143.0.7499.41 or later, where the vulnerability is patched. Organizations should enforce strict update policies to ensure timely deployment of security patches. Additionally, restrict local access to trusted users only, employing strong endpoint security controls such as user account management, least privilege principles, and endpoint detection and response (EDR) solutions. Educate users about the risks of opening untrusted HTML files and implement application whitelisting to prevent execution of unauthorized scripts or files. Network segmentation and monitoring can help detect suspicious local activity. For environments with high security needs, consider disabling or restricting the use of local HTML files or downloads from untrusted sources. Regularly audit and review local user permissions and access controls to minimize the risk of local exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2025-11-24T23:26:24.922Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692f3888e0601f8fcd7a94ce

Added to database: 12/2/2025, 7:05:44 PM

Last enriched: 12/2/2025, 7:24:56 PM

Last updated: 12/5/2025, 1:39:05 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats