CVE-2025-1918: Out of bounds read in Google Chrome
CVE-2025-1918 is a high-severity out-of-bounds read vulnerability in the PDFium component of Google Chrome versions prior to 134. 0. 6998. 35. It allows remote attackers to trigger out-of-bounds memory access by crafting malicious PDF files. Exploitation requires user interaction, such as opening a malicious PDF, and no privileges are needed to exploit this flaw. The vulnerability impacts confidentiality, integrity, and availability, potentially leading to information disclosure or browser crashes. Although no known exploits are currently in the wild, the high CVSS score (8. 8) indicates significant risk. Organizations using vulnerable Chrome versions should update immediately to mitigate this threat.
AI Analysis
Technical Summary
CVE-2025-1918 is an out-of-bounds read vulnerability found in the PDFium library integrated within Google Chrome versions prior to 134.0.6998.35. PDFium is responsible for rendering PDF documents in the browser. This vulnerability arises when a specially crafted PDF file causes the PDFium component to read memory outside of its intended bounds, potentially exposing sensitive information or causing memory corruption. The flaw can be triggered remotely by an attacker who convinces a user to open or preview a malicious PDF document, requiring user interaction but no prior authentication or elevated privileges. The vulnerability affects the confidentiality, integrity, and availability of the browser environment, as it may lead to information disclosure, browser crashes, or potentially facilitate further exploitation such as code execution through memory corruption chains. The CVSS 3.1 base score of 8.8 reflects the ease of remote exploitation (network vector), low attack complexity, no privileges required, but requiring user interaction, and the high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the severity and nature of the vulnerability make it a critical patching priority. The vulnerability was publicly disclosed on March 5, 2025, and Google has released version 134.0.6998.35 to address this issue. Organizations relying on Chrome for web browsing, especially those handling sensitive data or operating in high-risk environments, should prioritize updating to the patched version to mitigate potential exploitation risks.
Potential Impact
The vulnerability poses a significant risk to organizations worldwide by potentially exposing sensitive information through out-of-bounds memory reads, which can lead to data leakage. It also threatens the integrity and availability of the browser by causing crashes or enabling further exploitation. Attackers can remotely exploit this flaw by delivering malicious PDF files, making phishing campaigns or drive-by downloads effective attack vectors. This can result in compromised user sessions, unauthorized data access, or disruption of business operations. Enterprises with high reliance on Chrome for accessing web applications, especially those in finance, healthcare, government, and critical infrastructure sectors, face elevated risks. The vulnerability's ability to impact confidentiality, integrity, and availability simultaneously amplifies its threat level, potentially leading to regulatory compliance issues and reputational damage if exploited.
Mitigation Recommendations
1. Immediately update all Google Chrome installations to version 134.0.6998.35 or later to apply the official patch. 2. Implement network-level controls to block or quarantine suspicious PDF files, especially those received via email or downloaded from untrusted sources. 3. Employ endpoint security solutions capable of detecting and blocking malicious PDF payloads or anomalous PDF processing behaviors. 4. Educate users to avoid opening PDFs from unknown or untrusted sources and to report suspicious documents. 5. Where feasible, disable automatic PDF rendering or previewing in browsers and use dedicated PDF viewers with robust security controls. 6. Monitor security advisories and threat intelligence feeds for any emerging exploits targeting this vulnerability. 7. Conduct regular vulnerability assessments and penetration tests focusing on PDF handling components within the organization’s environment. 8. Apply principle of least privilege to browser processes and sandboxing features to limit the impact of potential exploitation.
Affected Countries
United States, United Kingdom, Germany, France, Japan, South Korea, Canada, Australia, India, Brazil, Netherlands, Sweden
CVE-2025-1918: Out of bounds read in Google Chrome
Description
CVE-2025-1918 is a high-severity out-of-bounds read vulnerability in the PDFium component of Google Chrome versions prior to 134. 0. 6998. 35. It allows remote attackers to trigger out-of-bounds memory access by crafting malicious PDF files. Exploitation requires user interaction, such as opening a malicious PDF, and no privileges are needed to exploit this flaw. The vulnerability impacts confidentiality, integrity, and availability, potentially leading to information disclosure or browser crashes. Although no known exploits are currently in the wild, the high CVSS score (8. 8) indicates significant risk. Organizations using vulnerable Chrome versions should update immediately to mitigate this threat.
AI-Powered Analysis
Technical Analysis
CVE-2025-1918 is an out-of-bounds read vulnerability found in the PDFium library integrated within Google Chrome versions prior to 134.0.6998.35. PDFium is responsible for rendering PDF documents in the browser. This vulnerability arises when a specially crafted PDF file causes the PDFium component to read memory outside of its intended bounds, potentially exposing sensitive information or causing memory corruption. The flaw can be triggered remotely by an attacker who convinces a user to open or preview a malicious PDF document, requiring user interaction but no prior authentication or elevated privileges. The vulnerability affects the confidentiality, integrity, and availability of the browser environment, as it may lead to information disclosure, browser crashes, or potentially facilitate further exploitation such as code execution through memory corruption chains. The CVSS 3.1 base score of 8.8 reflects the ease of remote exploitation (network vector), low attack complexity, no privileges required, but requiring user interaction, and the high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the severity and nature of the vulnerability make it a critical patching priority. The vulnerability was publicly disclosed on March 5, 2025, and Google has released version 134.0.6998.35 to address this issue. Organizations relying on Chrome for web browsing, especially those handling sensitive data or operating in high-risk environments, should prioritize updating to the patched version to mitigate potential exploitation risks.
Potential Impact
The vulnerability poses a significant risk to organizations worldwide by potentially exposing sensitive information through out-of-bounds memory reads, which can lead to data leakage. It also threatens the integrity and availability of the browser by causing crashes or enabling further exploitation. Attackers can remotely exploit this flaw by delivering malicious PDF files, making phishing campaigns or drive-by downloads effective attack vectors. This can result in compromised user sessions, unauthorized data access, or disruption of business operations. Enterprises with high reliance on Chrome for accessing web applications, especially those in finance, healthcare, government, and critical infrastructure sectors, face elevated risks. The vulnerability's ability to impact confidentiality, integrity, and availability simultaneously amplifies its threat level, potentially leading to regulatory compliance issues and reputational damage if exploited.
Mitigation Recommendations
1. Immediately update all Google Chrome installations to version 134.0.6998.35 or later to apply the official patch. 2. Implement network-level controls to block or quarantine suspicious PDF files, especially those received via email or downloaded from untrusted sources. 3. Employ endpoint security solutions capable of detecting and blocking malicious PDF payloads or anomalous PDF processing behaviors. 4. Educate users to avoid opening PDFs from unknown or untrusted sources and to report suspicious documents. 5. Where feasible, disable automatic PDF rendering or previewing in browsers and use dedicated PDF viewers with robust security controls. 6. Monitor security advisories and threat intelligence feeds for any emerging exploits targeting this vulnerability. 7. Conduct regular vulnerability assessments and penetration tests focusing on PDF handling components within the organization’s environment. 8. Apply principle of least privilege to browser processes and sandboxing features to limit the impact of potential exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Chrome
- Date Reserved
- 2025-03-04T01:05:42.841Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0a44b85912abc71d64b7b
Added to database: 2/26/2026, 7:51:39 PM
Last enriched: 2/26/2026, 8:59:49 PM
Last updated: 2/26/2026, 10:51:28 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-42056: n/a
MediumCVE-2024-3331: Vulnerability in Spotfire Spotfire Enterprise Runtime for R - Server Edition
MediumCVE-2024-32902: Denial of service in Google Android
HighCVE-2024-27218: Information disclosure in Google Android
MediumCVE-2026-3264: Execution After Redirect in go2ismail Free-CRM
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.