Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1916: Use after free in Google Chrome

0
High
VulnerabilityCVE-2025-1916cvecve-2025-1916
Published: Wed Mar 05 2025 (03/05/2025, 03:48:36 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Use after free in Profiles in Google Chrome prior to 134.0.6998.35 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

AI-Powered Analysis

AILast updated: 02/26/2026, 21:00:04 UTC

Technical Analysis

CVE-2025-1916 is a use-after-free vulnerability identified in the Profiles component of Google Chrome prior to version 134.0.6998.35. This vulnerability arises when the browser incorrectly manages memory related to user profiles, leading to a scenario where freed memory is accessed again. An attacker can exploit this flaw by first persuading a user to install a malicious extension, which then can trigger heap corruption through a specially crafted HTML page. Heap corruption can lead to arbitrary code execution within the context of the browser, allowing attackers to compromise user data, manipulate browser behavior, or crash the browser. The vulnerability has a CVSS v3.1 score of 8.8, indicating high severity, with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction (installing the malicious extension). The scope is unchanged, but the impact on confidentiality, integrity, and availability is high. Although no exploits have been observed in the wild, the potential for exploitation is significant given Chrome's widespread use and the ease of triggering the vulnerability once the extension is installed. Google has addressed this vulnerability in Chrome version 134.0.6998.35, but users running earlier versions remain at risk.

Potential Impact

The impact of CVE-2025-1916 is substantial for organizations and individual users relying on Google Chrome. Successful exploitation can lead to arbitrary code execution within the browser context, potentially allowing attackers to steal sensitive information such as credentials, session tokens, and personal data. It can also enable attackers to manipulate browser behavior, inject malicious content, or disrupt service availability by crashing the browser. Since Chrome is widely used globally across enterprises, governments, and consumers, the vulnerability poses a broad risk. Attackers exploiting this flaw could gain footholds for further network intrusion or data exfiltration. The requirement for user interaction (installing a malicious extension) somewhat limits the attack vector but social engineering techniques can effectively overcome this barrier. The high CVSS score reflects the critical nature of the vulnerability’s impact on confidentiality, integrity, and availability.

Mitigation Recommendations

To mitigate CVE-2025-1916, organizations and users should immediately update Google Chrome to version 134.0.6998.35 or later, where the vulnerability is patched. Beyond patching, organizations should enforce strict extension policies, allowing installation only from trusted sources or via enterprise-managed extension whitelists to reduce the risk of malicious extension installation. User education on the risks of installing untrusted extensions and recognizing social engineering attempts is critical. Implement browser security features such as sandboxing and enable Chrome’s built-in security protections like site isolation and strict content security policies. Network-level controls can also help by blocking access to known malicious sites hosting crafted HTML pages. Regularly audit installed extensions and remove any that are unnecessary or suspicious. Monitoring browser behavior for anomalies can provide early detection of exploitation attempts. Finally, maintain an incident response plan to quickly address any suspected compromise stemming from browser vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2025-03-04T01:05:42.262Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a44b85912abc71d64b77

Added to database: 2/26/2026, 7:51:39 PM

Last enriched: 2/26/2026, 9:00:04 PM

Last updated: 2/26/2026, 11:15:25 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses