CVE-2025-1916: Use after free in Google Chrome
Use after free in Profiles in Google Chrome prior to 134.0.6998.35 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
AI Analysis
Technical Summary
CVE-2025-1916 is a use-after-free vulnerability identified in the Profiles component of Google Chrome prior to version 134.0.6998.35. This vulnerability arises when the browser incorrectly manages memory related to user profiles, leading to a scenario where freed memory is accessed again. An attacker can exploit this flaw by first persuading a user to install a malicious extension, which then can trigger heap corruption through a specially crafted HTML page. Heap corruption can lead to arbitrary code execution within the context of the browser, allowing attackers to compromise user data, manipulate browser behavior, or crash the browser. The vulnerability has a CVSS v3.1 score of 8.8, indicating high severity, with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction (installing the malicious extension). The scope is unchanged, but the impact on confidentiality, integrity, and availability is high. Although no exploits have been observed in the wild, the potential for exploitation is significant given Chrome's widespread use and the ease of triggering the vulnerability once the extension is installed. Google has addressed this vulnerability in Chrome version 134.0.6998.35, but users running earlier versions remain at risk.
Potential Impact
The impact of CVE-2025-1916 is substantial for organizations and individual users relying on Google Chrome. Successful exploitation can lead to arbitrary code execution within the browser context, potentially allowing attackers to steal sensitive information such as credentials, session tokens, and personal data. It can also enable attackers to manipulate browser behavior, inject malicious content, or disrupt service availability by crashing the browser. Since Chrome is widely used globally across enterprises, governments, and consumers, the vulnerability poses a broad risk. Attackers exploiting this flaw could gain footholds for further network intrusion or data exfiltration. The requirement for user interaction (installing a malicious extension) somewhat limits the attack vector but social engineering techniques can effectively overcome this barrier. The high CVSS score reflects the critical nature of the vulnerability’s impact on confidentiality, integrity, and availability.
Mitigation Recommendations
To mitigate CVE-2025-1916, organizations and users should immediately update Google Chrome to version 134.0.6998.35 or later, where the vulnerability is patched. Beyond patching, organizations should enforce strict extension policies, allowing installation only from trusted sources or via enterprise-managed extension whitelists to reduce the risk of malicious extension installation. User education on the risks of installing untrusted extensions and recognizing social engineering attempts is critical. Implement browser security features such as sandboxing and enable Chrome’s built-in security protections like site isolation and strict content security policies. Network-level controls can also help by blocking access to known malicious sites hosting crafted HTML pages. Regularly audit installed extensions and remove any that are unnecessary or suspicious. Monitoring browser behavior for anomalies can provide early detection of exploitation attempts. Finally, maintain an incident response plan to quickly address any suspected compromise stemming from browser vulnerabilities.
Affected Countries
United States, United Kingdom, Germany, France, Japan, South Korea, India, Australia, Canada, Brazil, Russia, China
CVE-2025-1916: Use after free in Google Chrome
Description
Use after free in Profiles in Google Chrome prior to 134.0.6998.35 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
AI-Powered Analysis
Technical Analysis
CVE-2025-1916 is a use-after-free vulnerability identified in the Profiles component of Google Chrome prior to version 134.0.6998.35. This vulnerability arises when the browser incorrectly manages memory related to user profiles, leading to a scenario where freed memory is accessed again. An attacker can exploit this flaw by first persuading a user to install a malicious extension, which then can trigger heap corruption through a specially crafted HTML page. Heap corruption can lead to arbitrary code execution within the context of the browser, allowing attackers to compromise user data, manipulate browser behavior, or crash the browser. The vulnerability has a CVSS v3.1 score of 8.8, indicating high severity, with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction (installing the malicious extension). The scope is unchanged, but the impact on confidentiality, integrity, and availability is high. Although no exploits have been observed in the wild, the potential for exploitation is significant given Chrome's widespread use and the ease of triggering the vulnerability once the extension is installed. Google has addressed this vulnerability in Chrome version 134.0.6998.35, but users running earlier versions remain at risk.
Potential Impact
The impact of CVE-2025-1916 is substantial for organizations and individual users relying on Google Chrome. Successful exploitation can lead to arbitrary code execution within the browser context, potentially allowing attackers to steal sensitive information such as credentials, session tokens, and personal data. It can also enable attackers to manipulate browser behavior, inject malicious content, or disrupt service availability by crashing the browser. Since Chrome is widely used globally across enterprises, governments, and consumers, the vulnerability poses a broad risk. Attackers exploiting this flaw could gain footholds for further network intrusion or data exfiltration. The requirement for user interaction (installing a malicious extension) somewhat limits the attack vector but social engineering techniques can effectively overcome this barrier. The high CVSS score reflects the critical nature of the vulnerability’s impact on confidentiality, integrity, and availability.
Mitigation Recommendations
To mitigate CVE-2025-1916, organizations and users should immediately update Google Chrome to version 134.0.6998.35 or later, where the vulnerability is patched. Beyond patching, organizations should enforce strict extension policies, allowing installation only from trusted sources or via enterprise-managed extension whitelists to reduce the risk of malicious extension installation. User education on the risks of installing untrusted extensions and recognizing social engineering attempts is critical. Implement browser security features such as sandboxing and enable Chrome’s built-in security protections like site isolation and strict content security policies. Network-level controls can also help by blocking access to known malicious sites hosting crafted HTML pages. Regularly audit installed extensions and remove any that are unnecessary or suspicious. Monitoring browser behavior for anomalies can provide early detection of exploitation attempts. Finally, maintain an incident response plan to quickly address any suspected compromise stemming from browser vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Chrome
- Date Reserved
- 2025-03-04T01:05:42.262Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0a44b85912abc71d64b77
Added to database: 2/26/2026, 7:51:39 PM
Last enriched: 2/26/2026, 9:00:04 PM
Last updated: 2/26/2026, 11:15:25 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3268: Improper Access Controls in psi-probe PSI Probe
MediumCVE-2026-28280: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jmpsec osctrl
MediumCVE-2026-28279: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in jmpsec osctrl
HighCVE-2026-28276: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Morelitea initiative
HighCVE-2026-28275: CWE-613: Insufficient Session Expiration in Morelitea initiative
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.