Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14373: Inappropriate implementation in Google Chrome

0
Medium
VulnerabilityCVE-2025-14373cvecve-2025-14373
Published: Fri Dec 12 2025 (12/12/2025, 19:20:42 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Inappropriate implementation in Toolbar in Google Chrome on Android prior to 143.0.7499.110 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium)

AI-Powered Analysis

AILast updated: 12/19/2025, 20:22:45 UTC

Technical Analysis

CVE-2025-14373 is a vulnerability identified in the toolbar implementation of Google Chrome on Android devices, specifically in versions prior to 143.0.7499.110. The flaw allows a remote attacker to craft a malicious HTML page that can spoof the domain displayed in the browser's toolbar. This domain spoofing can mislead users into believing they are visiting a legitimate website when they are not, increasing the risk of phishing and social engineering attacks. The vulnerability stems from an inappropriate implementation in the toolbar UI component, categorized under CWE-1021 (Improper Restriction of Rendered UI Layers or Frames). The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R) to trigger the spoofing. The scope of the vulnerability is unchanged (S:U), and the impact affects confidentiality to a limited extent (C:L), with no impact on integrity or availability (I:N/A:N). No known exploits have been reported in the wild as of the publication date (December 12, 2025). The vulnerability is specific to the Android platform version of Chrome and does not affect desktop or iOS versions. The lack of a patch link in the provided data suggests that the fix is included in Chrome version 143.0.7499.110 or later. This vulnerability highlights the importance of UI security in browsers, especially on mobile platforms where users may be more susceptible to spoofing due to smaller screen sizes and limited visual cues.

Potential Impact

For European organizations, the primary impact of CVE-2025-14373 lies in the increased risk of phishing attacks facilitated by domain spoofing in Chrome on Android devices. Mobile devices are widely used across European enterprises for accessing corporate resources, email, and web applications. A successful spoofing attack could lead to credential theft, unauthorized access, or malware deployment if users are tricked into interacting with malicious sites masquerading as legitimate ones. Although the vulnerability does not directly compromise system integrity or availability, the indirect consequences of phishing can be severe, including data breaches and financial loss. Sectors with high mobile usage such as finance, healthcare, and government are particularly at risk. The medium severity rating and absence of known exploits reduce immediate urgency but do not eliminate the threat, especially as attackers may develop exploits over time. The impact is compounded in environments where users are less security-aware or where multi-factor authentication is not enforced.

Mitigation Recommendations

European organizations should implement targeted mitigation strategies beyond generic patching advice. First and foremost, ensure all Android devices running Chrome are updated to version 143.0.7499.110 or later, which contains the fix. Employ mobile device management (MDM) solutions to enforce browser updates and restrict installation of outdated or unapproved apps. Educate users about the risks of domain spoofing and encourage vigilance when interacting with links, especially those received via email or messaging apps. Deploy email filtering and anti-phishing technologies to reduce exposure to malicious links. Consider implementing browser security extensions or enterprise policies that highlight or verify URL authenticity. For high-risk sectors, enforce multi-factor authentication to mitigate credential theft risks. Monitor network traffic for suspicious activity indicative of phishing campaigns. Finally, collaborate with security teams to simulate phishing exercises that include domain spoofing scenarios to raise awareness and test defenses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2025-12-09T18:47:04.086Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693c6bdfa3f11564d0c8e407

Added to database: 12/12/2025, 7:24:15 PM

Last enriched: 12/19/2025, 8:22:45 PM

Last updated: 2/6/2026, 12:58:48 PM

Views: 154

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats