Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14765: Use after free in Google Chrome

0
High
VulnerabilityCVE-2025-14765cvecve-2025-14765
Published: Tue Dec 16 2025 (12/16/2025, 22:54:46 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

AILast updated: 12/24/2025, 00:15:35 UTC

Technical Analysis

CVE-2025-14765 is a use-after-free vulnerability identified in the WebGPU implementation of Google Chrome prior to version 143.0.7499.147. WebGPU is a web standard designed to provide modern graphics and computation capabilities in browsers. The vulnerability arises when Chrome improperly manages memory, allowing a remote attacker to trigger heap corruption by delivering a specially crafted HTML page. This memory corruption can lead to arbitrary code execution within the context of the browser process. The attack vector is remote network access via a malicious webpage, requiring only that a user visits the page (user interaction required). No privileges or authentication are necessary, making the attack feasible against any user running an affected Chrome version. The CVSS v3.1 score of 8.8 reflects high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although no public exploits have been reported yet, the nature of use-after-free bugs in browser engines historically leads to rapid exploitation once disclosed. The vulnerability affects all platforms running the vulnerable Chrome versions, including Windows, macOS, and Linux. The lack of available patches at the time of disclosure emphasizes the need for rapid update once fixes are released.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Google Chrome as a primary web browser. Successful exploitation could allow attackers to execute arbitrary code, potentially leading to data breaches, system compromise, or disruption of services. Sectors such as finance, government, healthcare, and critical infrastructure, which rely heavily on secure web access, are particularly vulnerable. The ability to exploit this remotely via a crafted webpage increases the attack surface, especially for employees accessing untrusted or malicious websites. The compromise of browser security can serve as a foothold for lateral movement within corporate networks, escalating the threat to organizational assets and sensitive information. Additionally, the vulnerability could be leveraged in targeted phishing campaigns or watering hole attacks against European entities. The absence of known exploits currently provides a window for proactive defense, but the high severity demands urgent attention.

Mitigation Recommendations

European organizations should prioritize upgrading Google Chrome to version 143.0.7499.147 or later as soon as the patch becomes available. Until then, organizations can mitigate risk by implementing strict web content filtering to block access to untrusted or suspicious websites. Employing browser isolation technologies can reduce exposure by executing web content in sandboxed environments. Security awareness training should emphasize the risks of visiting unknown or suspicious links, reducing the likelihood of user interaction with malicious pages. Network-level protections such as intrusion detection/prevention systems (IDS/IPS) should be tuned to detect anomalous web traffic patterns. Organizations should also monitor threat intelligence feeds for emerging exploit reports related to this vulnerability. Enforcing multi-factor authentication and least privilege principles can limit the impact of potential browser compromises. Finally, maintaining up-to-date endpoint detection and response (EDR) solutions will aid in early detection of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2025-12-16T00:50:49.039Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6941e6798258306a9da22874

Added to database: 12/16/2025, 11:08:41 PM

Last enriched: 12/24/2025, 12:15:35 AM

Last updated: 2/7/2026, 6:39:48 AM

Views: 1110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats