Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5280: Out of bounds write in Google Chrome

0
High
VulnerabilityCVE-2025-5280cvecve-2025-5280
Published: Tue May 27 2025 (05/27/2025, 20:43:03 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Out of bounds write in V8 in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:59:59 UTC

Technical Analysis

CVE-2025-5280 is an out-of-bounds write vulnerability classified under CWE-787, affecting the V8 JavaScript engine component of Google Chrome versions prior to 137.0.7151.55. The vulnerability arises from improper bounds checking during memory operations within V8, allowing a crafted HTML page to cause heap corruption. This memory corruption can be leveraged by remote attackers to execute arbitrary code in the context of the browser process. The attack vector is remote network access via a malicious web page, requiring user interaction to trigger the exploit. The vulnerability does not require any privileges or prior authentication, making it accessible to any user who visits a compromised or malicious site. The CVSS v3.1 base score of 8.8 reflects high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. While no public exploits have been reported yet, the nature of the flaw and the criticality of the V8 engine in Chrome's execution environment make this a significant threat. The vulnerability is addressed in Chrome version 137.0.7151.55 and later, though no direct patch links are provided in the source data. Given Chrome's dominant market share globally, this vulnerability has the potential to affect a vast number of users and organizations worldwide.

Potential Impact

The exploitation of CVE-2025-5280 can lead to arbitrary code execution within the context of the Chrome browser, compromising the confidentiality, integrity, and availability of the affected system. Attackers could execute malicious code, steal sensitive information, manipulate browser data, or disrupt browser functionality. This could serve as a foothold for further attacks on the host system or network, including lateral movement and data exfiltration. Organizations relying on Chrome for web access, especially those handling sensitive or critical data, face increased risk of data breaches and operational disruption. The requirement for user interaction (visiting a malicious page) means phishing or drive-by download attacks could be effective vectors. The widespread use of Chrome in enterprise and consumer environments amplifies the potential scale of impact globally.

Mitigation Recommendations

1. Immediately update Google Chrome to version 137.0.7151.55 or later once patches are available to remediate the vulnerability. 2. Employ enterprise browser management tools to enforce timely updates and prevent use of vulnerable versions. 3. Use web content filtering and URL reputation services to block access to known malicious sites. 4. Implement network-level protections such as intrusion detection/prevention systems (IDS/IPS) to detect and block exploit attempts targeting this vulnerability. 5. Educate users about the risks of visiting untrusted websites and encourage cautious browsing behavior to reduce the likelihood of triggering the exploit. 6. Enable Chrome’s built-in security features such as site isolation, sandboxing, and strict content security policies to limit the impact of potential exploitation. 7. Monitor security advisories from Google and threat intelligence sources for updates on exploit availability and additional mitigation guidance. 8. Consider deploying endpoint detection and response (EDR) solutions capable of detecting anomalous browser behavior indicative of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Chrome
Date Reserved
2025-05-27T15:48:22.536Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68362775182aa0cae225091f

Added to database: 5/27/2025, 8:58:29 PM

Last enriched: 2/26/2026, 9:59:59 PM

Last updated: 3/23/2026, 7:52:28 PM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses