Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3067: Inappropriate implementation in Google Chrome

0
High
VulnerabilityCVE-2025-3067cvecve-2025-3067
Published: Wed Apr 02 2025 (04/02/2025, 00:42:10 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform privilege escalation via a crafted app. (Chromium security severity: Medium)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:29:45 UTC

Technical Analysis

CVE-2025-3067 is a vulnerability identified in the Custom Tabs implementation of Google Chrome on Android devices prior to version 135.0.7049.52. Custom Tabs are a feature that allows apps to open web content within a Chrome-powered interface, providing a seamless user experience. The vulnerability arises from an inappropriate implementation that can be exploited by a remote attacker who persuades a user to perform specific UI gestures within a maliciously crafted app. This user interaction triggers a privilege escalation, allowing the attacker to gain higher privileges than intended, potentially compromising the device's security. The CVSS v3.1 score of 8.8 reflects the high severity, with attack vector being network-based (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability represents a significant risk due to the widespread use of Chrome on Android and the potential for privilege escalation through social engineering and crafted apps. The vulnerability was publicly disclosed on April 2, 2025, and users are advised to update to the patched version 135.0.7049.52 or later to remediate the issue.

Potential Impact

The vulnerability allows remote attackers to escalate privileges on affected Android devices by exploiting the Custom Tabs feature in Chrome. This can lead to complete compromise of the device, including unauthorized access to sensitive data, modification or deletion of information, and disruption of device functionality. Organizations relying on Android devices for sensitive communications or operations could face data breaches, loss of intellectual property, or operational downtime. The requirement for user interaction means social engineering tactics could be employed, increasing the likelihood of successful exploitation. Given Chrome's dominant market share on Android, the scope of affected systems is extensive, potentially impacting millions of users globally. The high severity and ease of exploitation without prior privileges make this a critical concern for enterprise mobile security and personal device safety.

Mitigation Recommendations

To mitigate this vulnerability, organizations and users should immediately update Google Chrome on Android devices to version 135.0.7049.52 or later, where the issue is patched. Beyond patching, organizations should implement mobile device management (MDM) solutions to enforce timely updates and restrict installation of untrusted or suspicious apps that could exploit this vulnerability. User education is critical to reduce the risk of social engineering attacks that require specific UI gestures; training should emphasize caution when interacting with unknown apps or prompts. Additionally, monitoring for unusual app behaviors and privilege escalations can help detect exploitation attempts. Developers should review and harden the implementation of Custom Tabs and similar features to prevent UI-based privilege escalation. Finally, applying the principle of least privilege on mobile devices can limit the impact of any successful exploit.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Chrome
Date Reserved
2025-03-31T22:38:35.995Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68be1ecce3f0bafba8aa56b5

Added to database: 9/8/2025, 12:09:48 AM

Last enriched: 2/26/2026, 9:29:45 PM

Last updated: 3/25/2026, 10:49:19 PM

Views: 245

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses