Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9478: Use after free in Google Chrome

0
High
VulnerabilityCVE-2025-9478cvecve-2025-9478
Published: Tue Aug 26 2025 (08/26/2025, 18:51:35 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Use after free in ANGLE in Google Chrome prior to 139.0.7258.154 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:29:02 UTC

Technical Analysis

CVE-2025-9478 is a critical security vulnerability identified in the ANGLE graphics engine component used by Google Chrome browsers prior to version 139.0.7258.154. The vulnerability is classified as a use-after-free flaw, which occurs when the program continues to use memory after it has been freed, leading to heap corruption. An attacker can exploit this by delivering a specially crafted HTML page that triggers the flaw when rendered by the browser. This heap corruption can be leveraged to execute arbitrary code remotely, potentially allowing full compromise of the victim’s system. The vulnerability requires no privileges (AV:N), has low attack complexity (AC:L), does not require authentication (PR:N), but requires user interaction (UI:R) such as visiting a malicious webpage. The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Despite no known exploits in the wild at the time of publication, the severity and ease of exploitation make this a significant threat. The vulnerability affects a core component of Chrome, a widely used browser globally, increasing the potential attack surface. The lack of patch links in the provided data suggests immediate attention is needed to obtain the official update from Google. This vulnerability underscores the importance of timely patching and cautious browsing behavior.

Potential Impact

The exploitation of CVE-2025-9478 can have severe consequences for organizations and individual users worldwide. Successful exploitation allows remote attackers to execute arbitrary code within the context of the browser, potentially leading to full system compromise. This can result in data theft, installation of malware or ransomware, unauthorized access to sensitive information, and disruption of services. Given Chrome’s dominant market share across enterprises, governments, and consumers, the vulnerability poses a broad risk. Attackers could leverage this flaw to target high-value entities such as financial institutions, government agencies, and critical infrastructure operators. The requirement for user interaction means phishing or social engineering campaigns could be used to lure victims to malicious sites. The high impact on confidentiality, integrity, and availability means that exploitation could lead to significant operational and reputational damage, regulatory penalties, and financial losses.

Mitigation Recommendations

To mitigate CVE-2025-9478, organizations should immediately update Google Chrome to version 139.0.7258.154 or later once the patch is officially released by Google. Until patched, organizations should implement network-level protections such as web filtering to block access to untrusted or suspicious websites. Employ browser security features like site isolation and sandboxing to limit the impact of exploitation. Educate users about the risks of clicking on unknown links or visiting untrusted websites to reduce the likelihood of triggering the vulnerability. Use endpoint detection and response (EDR) tools to monitor for anomalous browser behavior indicative of exploitation attempts. Additionally, consider deploying application allowlisting to restrict execution of unauthorized code. Regularly review and update incident response plans to address potential browser-based compromises. Finally, maintain up-to-date threat intelligence feeds to stay informed about any emerging exploits targeting this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Chrome
Date Reserved
2025-08-25T18:07:15.832Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ae04daad5a09ad005ad9f0

Added to database: 8/26/2025, 7:02:50 PM

Last enriched: 2/27/2026, 4:29:02 AM

Last updated: 3/23/2026, 12:34:56 AM

Views: 516

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses