Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14372: Use after free in Google Chrome

0
Medium
VulnerabilityCVE-2025-14372cvecve-2025-14372
Published: Fri Dec 12 2025 (12/12/2025, 19:20:42 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Use after free in Password Manager in Google Chrome prior to 143.0.7499.110 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)

AI-Powered Analysis

AILast updated: 12/12/2025, 19:31:23 UTC

Technical Analysis

CVE-2025-14372 is a use-after-free vulnerability identified in the Password Manager component of Google Chrome prior to version 143.0.7499.110. Use-after-free vulnerabilities occur when a program continues to use memory after it has been freed, leading to undefined behavior that attackers can exploit to execute arbitrary code or escalate privileges. In this case, the flaw allows a remote attacker to craft a malicious HTML page that triggers the vulnerability, potentially enabling sandbox escape. Sandbox escape is critical because it breaks the isolation that browsers enforce to protect the underlying operating system and user data from malicious web content. The vulnerability does not require authentication but likely requires the victim to visit a malicious webpage, making it a remote code execution vector with user interaction. Although no public exploits are currently known, the medium severity rating by Chromium indicates a significant risk that could be leveraged in targeted attacks. The vulnerability affects a widely used browser component, increasing the potential attack surface. The lack of a CVSS score means severity must be inferred from the nature of the vulnerability, its exploitability, and potential impact. The vulnerability was publicly disclosed on December 12, 2025, with a patch available in Chrome 143.0.7499.110, emphasizing the need for timely updates.

Potential Impact

For European organizations, the impact of CVE-2025-14372 could be substantial due to the widespread use of Google Chrome in enterprise and public sectors. Successful exploitation could allow attackers to escape the browser sandbox, leading to unauthorized access to the host system, data theft, or further lateral movement within corporate networks. This could compromise sensitive information, including credentials managed by the browser's Password Manager, potentially leading to broader breaches. The vulnerability's remote exploitation capability increases the risk of drive-by attacks through malicious websites or phishing campaigns. Organizations in sectors with high regulatory requirements for data protection, such as finance, healthcare, and government, could face compliance violations and reputational damage if exploited. The absence of known exploits currently provides a window for proactive defense, but the potential for rapid weaponization necessitates urgent patching and monitoring. The impact on availability is limited, but confidentiality and integrity could be severely affected.

Mitigation Recommendations

1. Immediately update all Google Chrome installations to version 143.0.7499.110 or later to apply the official patch addressing this vulnerability. 2. Implement strict Content Security Policies (CSP) to restrict the execution of untrusted scripts and reduce the risk of malicious HTML content triggering the vulnerability. 3. Employ browser isolation technologies or sandboxing at the enterprise level to contain potential exploitation attempts. 4. Educate users about the risks of visiting untrusted websites and phishing attacks that could deliver malicious payloads exploiting this vulnerability. 5. Monitor network traffic and endpoint logs for unusual activity indicative of sandbox escape attempts or exploitation. 6. Disable or restrict the use of the Password Manager feature in Chrome where feasible, especially in high-risk environments, until patches are fully deployed. 7. Coordinate with IT asset management to ensure all devices, including remote and mobile endpoints, receive timely updates. 8. Stay informed through official Google security advisories and threat intelligence feeds for any emerging exploit reports or additional mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2025-12-09T18:47:03.634Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693c6bdfa3f11564d0c8e403

Added to database: 12/12/2025, 7:24:15 PM

Last enriched: 12/12/2025, 7:31:23 PM

Last updated: 12/15/2025, 4:01:35 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats