CVE-2025-14372: Use after free in Google Chrome
CVE-2025-14372 is a use-after-free vulnerability in the Password Manager component of Google Chrome versions prior to 143. 0. 7499. 110. This flaw allows a remote attacker to potentially escape the browser sandbox by crafting a malicious HTML page. The vulnerability has a CVSS score of 6. 1, indicating medium severity, with impacts on confidentiality and integrity but no direct availability impact. Exploitation requires user interaction, such as visiting a malicious webpage, and no privileges are needed. There are no known exploits in the wild currently. European organizations using vulnerable Chrome versions could face risks of credential theft or further system compromise if exploited.
AI Analysis
Technical Summary
CVE-2025-14372 is a use-after-free vulnerability identified in the Password Manager component of Google Chrome prior to version 143.0.7499.110. Use-after-free (CWE-416) vulnerabilities occur when a program continues to use a pointer after the memory it points to has been freed, leading to undefined behavior including potential code execution. In this case, the flaw allows a remote attacker to craft a malicious HTML page that triggers the vulnerability, potentially enabling sandbox escape. Sandbox escape is a critical step for attackers to break out of the browser's restricted environment and execute arbitrary code on the host system. The vulnerability requires no privileges and no authentication but does require user interaction, such as visiting a malicious webpage. The CVSS 3.1 base score is 6.1 (medium severity), with vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and low impact on confidentiality and integrity, with no impact on availability. Although no known exploits are reported in the wild, the potential for sandbox escape makes this vulnerability significant. The lack of a patch link in the provided data suggests that the fix is included in Chrome version 143.0.7499.110, and users should upgrade to this or later versions to mitigate risk.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized access to sensitive information stored in the browser's password manager, undermining confidentiality. A successful sandbox escape could allow attackers to execute arbitrary code on the host system, potentially leading to broader system compromise, data theft, or lateral movement within corporate networks. This risk is particularly concerning for organizations with employees who frequently use Chrome for web access, especially in sectors handling sensitive data such as finance, healthcare, and government. The medium severity rating reflects that while exploitation requires user interaction, the consequences of a sandbox escape can be severe. Additionally, the widespread use of Chrome in Europe increases the potential attack surface. However, the absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat. Organizations relying on Chrome should consider this vulnerability a significant security concern.
Mitigation Recommendations
1. Immediately update all Google Chrome installations to version 143.0.7499.110 or later, as this version contains the fix for CVE-2025-14372. 2. Implement strict Content Security Policies (CSP) to restrict the execution of untrusted scripts and reduce the risk of malicious HTML pages triggering the vulnerability. 3. Educate users about the risks of visiting untrusted websites and clicking on unknown links to minimize user interaction exploitation vectors. 4. Employ endpoint detection and response (EDR) solutions capable of detecting unusual sandbox escape behaviors or exploitation attempts. 5. Regularly audit browser extensions and plugins to ensure they do not introduce additional vulnerabilities or weaken sandbox protections. 6. Monitor security advisories from Google and other trusted sources for updates or emerging exploit reports related to this vulnerability. 7. Consider network-level protections such as web filtering to block access to known malicious sites that could host exploit pages. 8. For high-risk environments, consider isolating browser processes or using dedicated browsing environments to limit potential damage from exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-14372: Use after free in Google Chrome
Description
CVE-2025-14372 is a use-after-free vulnerability in the Password Manager component of Google Chrome versions prior to 143. 0. 7499. 110. This flaw allows a remote attacker to potentially escape the browser sandbox by crafting a malicious HTML page. The vulnerability has a CVSS score of 6. 1, indicating medium severity, with impacts on confidentiality and integrity but no direct availability impact. Exploitation requires user interaction, such as visiting a malicious webpage, and no privileges are needed. There are no known exploits in the wild currently. European organizations using vulnerable Chrome versions could face risks of credential theft or further system compromise if exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-14372 is a use-after-free vulnerability identified in the Password Manager component of Google Chrome prior to version 143.0.7499.110. Use-after-free (CWE-416) vulnerabilities occur when a program continues to use a pointer after the memory it points to has been freed, leading to undefined behavior including potential code execution. In this case, the flaw allows a remote attacker to craft a malicious HTML page that triggers the vulnerability, potentially enabling sandbox escape. Sandbox escape is a critical step for attackers to break out of the browser's restricted environment and execute arbitrary code on the host system. The vulnerability requires no privileges and no authentication but does require user interaction, such as visiting a malicious webpage. The CVSS 3.1 base score is 6.1 (medium severity), with vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and low impact on confidentiality and integrity, with no impact on availability. Although no known exploits are reported in the wild, the potential for sandbox escape makes this vulnerability significant. The lack of a patch link in the provided data suggests that the fix is included in Chrome version 143.0.7499.110, and users should upgrade to this or later versions to mitigate risk.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized access to sensitive information stored in the browser's password manager, undermining confidentiality. A successful sandbox escape could allow attackers to execute arbitrary code on the host system, potentially leading to broader system compromise, data theft, or lateral movement within corporate networks. This risk is particularly concerning for organizations with employees who frequently use Chrome for web access, especially in sectors handling sensitive data such as finance, healthcare, and government. The medium severity rating reflects that while exploitation requires user interaction, the consequences of a sandbox escape can be severe. Additionally, the widespread use of Chrome in Europe increases the potential attack surface. However, the absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat. Organizations relying on Chrome should consider this vulnerability a significant security concern.
Mitigation Recommendations
1. Immediately update all Google Chrome installations to version 143.0.7499.110 or later, as this version contains the fix for CVE-2025-14372. 2. Implement strict Content Security Policies (CSP) to restrict the execution of untrusted scripts and reduce the risk of malicious HTML pages triggering the vulnerability. 3. Educate users about the risks of visiting untrusted websites and clicking on unknown links to minimize user interaction exploitation vectors. 4. Employ endpoint detection and response (EDR) solutions capable of detecting unusual sandbox escape behaviors or exploitation attempts. 5. Regularly audit browser extensions and plugins to ensure they do not introduce additional vulnerabilities or weaken sandbox protections. 6. Monitor security advisories from Google and other trusted sources for updates or emerging exploit reports related to this vulnerability. 7. Consider network-level protections such as web filtering to block access to known malicious sites that could host exploit pages. 8. For high-risk environments, consider isolating browser processes or using dedicated browsing environments to limit potential damage from exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Chrome
- Date Reserved
- 2025-12-09T18:47:03.634Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693c6bdfa3f11564d0c8e403
Added to database: 12/12/2025, 7:24:15 PM
Last enriched: 12/19/2025, 8:23:20 PM
Last updated: 2/7/2026, 8:41:46 AM
Views: 169
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
MediumCVE-2026-2078: Improper Authorization in yeqifu warehouse
MediumCVE-2026-25533: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in agentfront enclave
MediumCVE-2026-25123: CWE-918: Server-Side Request Forgery (SSRF) in homarr-labs homarr
MediumCVE-2025-68621: CWE-208: Observable Timing Discrepancy in TriliumNext Trilium
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.