CVE-2025-1915: Improper Limitation of a Pathname to a Restricted Directory in Google Chrome
Improper Limitation of a Pathname to a Restricted Directory in DevTools in Google Chrome on Windows prior to 134.0.6998.35 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)
AI Analysis
Technical Summary
CVE-2025-1915 is a vulnerability identified in Google Chrome's DevTools on Windows platforms prior to version 134.0.6998.35. The issue stems from improper limitation of pathnames to restricted directories, which allows a maliciously crafted Chrome extension to bypass file access restrictions. Specifically, an attacker who convinces a user to install such an extension can exploit this flaw to access files outside the intended sandbox or restricted directories, potentially exposing sensitive user data or system files. The vulnerability is exploitable remotely over the network without requiring privileges but does require user interaction in the form of installing the malicious extension. The flaw affects the confidentiality and integrity of the system by enabling unauthorized file access and potential manipulation. The CVSS v3.1 score of 8.1 reflects the high impact and ease of exploitation given user interaction. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk due to Chrome's widespread use and the common practice of installing extensions. The vulnerability highlights the importance of strict pathname validation within browser components, especially those like DevTools that have elevated access capabilities. Google has addressed this issue in Chrome version 134.0.6998.35, and users are urged to update promptly to mitigate risk.
Potential Impact
The vulnerability allows attackers to bypass file access restrictions via a malicious Chrome extension, potentially exposing sensitive files and data on affected Windows systems. This can lead to unauthorized disclosure of confidential information, manipulation of files, and compromise of user privacy and system integrity. Organizations relying heavily on Chrome and its extensions, especially in environments where users have the ability to install extensions, face increased risk of targeted attacks or data breaches. While availability is not impacted, the breach of confidentiality and integrity can have severe consequences, including intellectual property theft, exposure of personal data, and undermining trust in organizational IT infrastructure. The ease of exploitation combined with the widespread use of Chrome increases the potential attack surface globally.
Mitigation Recommendations
1. Immediately update Google Chrome to version 134.0.6998.35 or later, where the vulnerability is patched. 2. Implement strict policies to control and limit the installation of Chrome extensions, especially from untrusted sources. 3. Educate users about the risks of installing extensions and encourage verification of extension authenticity. 4. Employ endpoint security solutions that monitor and restrict unauthorized file access by browser extensions. 5. Regularly audit installed extensions and remove any that are unnecessary or suspicious. 6. Use enterprise management tools to enforce extension whitelisting and prevent sideloading of unapproved extensions. 7. Monitor network and system logs for unusual file access patterns that may indicate exploitation attempts.
Affected Countries
United States, Germany, Japan, South Korea, United Kingdom, Australia, Canada, France, India, Brazil
CVE-2025-1915: Improper Limitation of a Pathname to a Restricted Directory in Google Chrome
Description
Improper Limitation of a Pathname to a Restricted Directory in DevTools in Google Chrome on Windows prior to 134.0.6998.35 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)
AI-Powered Analysis
Technical Analysis
CVE-2025-1915 is a vulnerability identified in Google Chrome's DevTools on Windows platforms prior to version 134.0.6998.35. The issue stems from improper limitation of pathnames to restricted directories, which allows a maliciously crafted Chrome extension to bypass file access restrictions. Specifically, an attacker who convinces a user to install such an extension can exploit this flaw to access files outside the intended sandbox or restricted directories, potentially exposing sensitive user data or system files. The vulnerability is exploitable remotely over the network without requiring privileges but does require user interaction in the form of installing the malicious extension. The flaw affects the confidentiality and integrity of the system by enabling unauthorized file access and potential manipulation. The CVSS v3.1 score of 8.1 reflects the high impact and ease of exploitation given user interaction. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk due to Chrome's widespread use and the common practice of installing extensions. The vulnerability highlights the importance of strict pathname validation within browser components, especially those like DevTools that have elevated access capabilities. Google has addressed this issue in Chrome version 134.0.6998.35, and users are urged to update promptly to mitigate risk.
Potential Impact
The vulnerability allows attackers to bypass file access restrictions via a malicious Chrome extension, potentially exposing sensitive files and data on affected Windows systems. This can lead to unauthorized disclosure of confidential information, manipulation of files, and compromise of user privacy and system integrity. Organizations relying heavily on Chrome and its extensions, especially in environments where users have the ability to install extensions, face increased risk of targeted attacks or data breaches. While availability is not impacted, the breach of confidentiality and integrity can have severe consequences, including intellectual property theft, exposure of personal data, and undermining trust in organizational IT infrastructure. The ease of exploitation combined with the widespread use of Chrome increases the potential attack surface globally.
Mitigation Recommendations
1. Immediately update Google Chrome to version 134.0.6998.35 or later, where the vulnerability is patched. 2. Implement strict policies to control and limit the installation of Chrome extensions, especially from untrusted sources. 3. Educate users about the risks of installing extensions and encourage verification of extension authenticity. 4. Employ endpoint security solutions that monitor and restrict unauthorized file access by browser extensions. 5. Regularly audit installed extensions and remove any that are unnecessary or suspicious. 6. Use enterprise management tools to enforce extension whitelisting and prevent sideloading of unapproved extensions. 7. Monitor network and system logs for unusual file access patterns that may indicate exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Chrome
- Date Reserved
- 2025-03-04T01:05:42.067Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0a44b85912abc71d64b73
Added to database: 2/26/2026, 7:51:39 PM
Last enriched: 2/26/2026, 9:00:19 PM
Last updated: 2/26/2026, 11:16:37 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3268: Improper Access Controls in psi-probe PSI Probe
MediumCVE-2026-28280: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jmpsec osctrl
MediumCVE-2026-28279: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in jmpsec osctrl
HighCVE-2026-28276: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Morelitea initiative
HighCVE-2026-28275: CWE-613: Insufficient Session Expiration in Morelitea initiative
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.