Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14372: Use after free in Google Chrome

0
Medium
VulnerabilityCVE-2025-14372cvecve-2025-14372
Published: Fri Dec 12 2025 (12/12/2025, 19:20:42 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

CVE-2025-14372 is a use-after-free vulnerability in the Password Manager component of Google Chrome versions prior to 143. 0. 7499. 110. This flaw allows a remote attacker to potentially escape the browser sandbox by crafting a malicious HTML page. The vulnerability has a CVSS score of 6. 1, indicating medium severity, with impacts on confidentiality and integrity but no direct availability impact. Exploitation requires user interaction, such as visiting a malicious webpage, and no privileges are needed. There are no known exploits in the wild currently. European organizations using vulnerable Chrome versions could face risks of credential theft or further system compromise if exploited.

AI-Powered Analysis

AILast updated: 12/19/2025, 20:23:20 UTC

Technical Analysis

CVE-2025-14372 is a use-after-free vulnerability identified in the Password Manager component of Google Chrome prior to version 143.0.7499.110. Use-after-free (CWE-416) vulnerabilities occur when a program continues to use a pointer after the memory it points to has been freed, leading to undefined behavior including potential code execution. In this case, the flaw allows a remote attacker to craft a malicious HTML page that triggers the vulnerability, potentially enabling sandbox escape. Sandbox escape is a critical step for attackers to break out of the browser's restricted environment and execute arbitrary code on the host system. The vulnerability requires no privileges and no authentication but does require user interaction, such as visiting a malicious webpage. The CVSS 3.1 base score is 6.1 (medium severity), with vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and low impact on confidentiality and integrity, with no impact on availability. Although no known exploits are reported in the wild, the potential for sandbox escape makes this vulnerability significant. The lack of a patch link in the provided data suggests that the fix is included in Chrome version 143.0.7499.110, and users should upgrade to this or later versions to mitigate risk.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized access to sensitive information stored in the browser's password manager, undermining confidentiality. A successful sandbox escape could allow attackers to execute arbitrary code on the host system, potentially leading to broader system compromise, data theft, or lateral movement within corporate networks. This risk is particularly concerning for organizations with employees who frequently use Chrome for web access, especially in sectors handling sensitive data such as finance, healthcare, and government. The medium severity rating reflects that while exploitation requires user interaction, the consequences of a sandbox escape can be severe. Additionally, the widespread use of Chrome in Europe increases the potential attack surface. However, the absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat. Organizations relying on Chrome should consider this vulnerability a significant security concern.

Mitigation Recommendations

1. Immediately update all Google Chrome installations to version 143.0.7499.110 or later, as this version contains the fix for CVE-2025-14372. 2. Implement strict Content Security Policies (CSP) to restrict the execution of untrusted scripts and reduce the risk of malicious HTML pages triggering the vulnerability. 3. Educate users about the risks of visiting untrusted websites and clicking on unknown links to minimize user interaction exploitation vectors. 4. Employ endpoint detection and response (EDR) solutions capable of detecting unusual sandbox escape behaviors or exploitation attempts. 5. Regularly audit browser extensions and plugins to ensure they do not introduce additional vulnerabilities or weaken sandbox protections. 6. Monitor security advisories from Google and other trusted sources for updates or emerging exploit reports related to this vulnerability. 7. Consider network-level protections such as web filtering to block access to known malicious sites that could host exploit pages. 8. For high-risk environments, consider isolating browser processes or using dedicated browsing environments to limit potential damage from exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2025-12-09T18:47:03.634Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693c6bdfa3f11564d0c8e403

Added to database: 12/12/2025, 7:24:15 PM

Last enriched: 12/19/2025, 8:23:20 PM

Last updated: 2/7/2026, 8:41:46 AM

Views: 169

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats