Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1918: Out of bounds read in Google Chrome

0
High
VulnerabilityCVE-2025-1918cvecve-2025-1918
Published: Wed Mar 05 2025 (03/05/2025, 03:48:36 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

CVE-2025-1918 is a high-severity out-of-bounds read vulnerability in the PDFium component of Google Chrome versions prior to 134. 0. 6998. 35. It allows remote attackers to trigger out-of-bounds memory access by crafting malicious PDF files. Exploitation requires user interaction, such as opening a malicious PDF, and no privileges are needed to exploit this flaw. The vulnerability impacts confidentiality, integrity, and availability, potentially leading to information disclosure or browser crashes. Although no known exploits are currently in the wild, the high CVSS score (8. 8) indicates significant risk. Organizations using vulnerable Chrome versions should update immediately to mitigate this threat.

AI-Powered Analysis

AILast updated: 02/26/2026, 20:59:49 UTC

Technical Analysis

CVE-2025-1918 is an out-of-bounds read vulnerability found in the PDFium library integrated within Google Chrome versions prior to 134.0.6998.35. PDFium is responsible for rendering PDF documents in the browser. This vulnerability arises when a specially crafted PDF file causes the PDFium component to read memory outside of its intended bounds, potentially exposing sensitive information or causing memory corruption. The flaw can be triggered remotely by an attacker who convinces a user to open or preview a malicious PDF document, requiring user interaction but no prior authentication or elevated privileges. The vulnerability affects the confidentiality, integrity, and availability of the browser environment, as it may lead to information disclosure, browser crashes, or potentially facilitate further exploitation such as code execution through memory corruption chains. The CVSS 3.1 base score of 8.8 reflects the ease of remote exploitation (network vector), low attack complexity, no privileges required, but requiring user interaction, and the high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the severity and nature of the vulnerability make it a critical patching priority. The vulnerability was publicly disclosed on March 5, 2025, and Google has released version 134.0.6998.35 to address this issue. Organizations relying on Chrome for web browsing, especially those handling sensitive data or operating in high-risk environments, should prioritize updating to the patched version to mitigate potential exploitation risks.

Potential Impact

The vulnerability poses a significant risk to organizations worldwide by potentially exposing sensitive information through out-of-bounds memory reads, which can lead to data leakage. It also threatens the integrity and availability of the browser by causing crashes or enabling further exploitation. Attackers can remotely exploit this flaw by delivering malicious PDF files, making phishing campaigns or drive-by downloads effective attack vectors. This can result in compromised user sessions, unauthorized data access, or disruption of business operations. Enterprises with high reliance on Chrome for accessing web applications, especially those in finance, healthcare, government, and critical infrastructure sectors, face elevated risks. The vulnerability's ability to impact confidentiality, integrity, and availability simultaneously amplifies its threat level, potentially leading to regulatory compliance issues and reputational damage if exploited.

Mitigation Recommendations

1. Immediately update all Google Chrome installations to version 134.0.6998.35 or later to apply the official patch. 2. Implement network-level controls to block or quarantine suspicious PDF files, especially those received via email or downloaded from untrusted sources. 3. Employ endpoint security solutions capable of detecting and blocking malicious PDF payloads or anomalous PDF processing behaviors. 4. Educate users to avoid opening PDFs from unknown or untrusted sources and to report suspicious documents. 5. Where feasible, disable automatic PDF rendering or previewing in browsers and use dedicated PDF viewers with robust security controls. 6. Monitor security advisories and threat intelligence feeds for any emerging exploits targeting this vulnerability. 7. Conduct regular vulnerability assessments and penetration tests focusing on PDF handling components within the organization’s environment. 8. Apply principle of least privilege to browser processes and sandboxing features to limit the impact of potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2025-03-04T01:05:42.841Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a44b85912abc71d64b7b

Added to database: 2/26/2026, 7:51:39 PM

Last enriched: 2/26/2026, 8:59:49 PM

Last updated: 2/26/2026, 10:51:28 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses