Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Microsoft Edge (Chromium-based) 135.0.7049.114/.115 - Information Disclosure

0
Medium
Published: Sun Aug 03 2025 (08/03/2025, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

Microsoft Edge (Chromium-based) 135.0.7049.114/.115 - Information Disclosure

AI-Powered Analysis

AILast updated: 10/27/2025, 01:41:17 UTC

Technical Analysis

This security threat concerns an information disclosure vulnerability in Microsoft Edge Chromium-based browser versions 135.0.7049.114 and 135.0.7049.115. The vulnerability enables remote attackers to exploit the browser to leak sensitive information, potentially including browsing data, session tokens, or other confidential user information. The exploit is classified as remote, indicating that attackers do not require local access or physical proximity to the target system. The presence of publicly available exploit code written in Perl suggests that the vulnerability is exploitable with moderate technical skill, increasing the risk of exploitation. However, no known exploits have been observed in the wild to date, and no official patches or updates have been linked, implying that the vulnerability might be newly disclosed or under investigation. The lack of detailed technical information such as CWE identifiers or specific attack vectors limits the depth of analysis, but the medium severity rating reflects a moderate impact on confidentiality without direct impact on integrity or availability. The vulnerability likely arises from improper handling of browser data or memory, allowing unauthorized disclosure of information. Organizations relying on these Edge versions should be aware of the risk of data leakage and take proactive steps to mitigate exposure until a patch is available.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive information leakage, which can lead to privacy violations, exposure of confidential business data, and potential compliance issues under regulations like GDPR. Attackers exploiting this flaw could harvest session cookies, authentication tokens, or other browser-stored secrets, facilitating further attacks such as account takeover or lateral movement within networks. Sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to the sensitive nature of their data and the widespread use of Microsoft Edge in enterprise environments. The medium severity suggests that while the impact is significant, it does not directly compromise system integrity or availability, but the confidentiality breach alone can have serious consequences including reputational damage and regulatory penalties. The remote nature of the exploit increases the attack surface, as attackers can target users over the internet without requiring physical access or user interaction.

Mitigation Recommendations

1. Immediately monitor for official Microsoft security advisories and apply patches or updates as soon as they become available for the affected Edge versions. 2. Temporarily restrict or block the use of Microsoft Edge versions 135.0.7049.114 and 135.0.7049.115 within the organization until a fix is applied. 3. Employ network-level protections such as web filtering and intrusion detection systems to detect and block exploit attempts targeting this vulnerability. 4. Educate users about the risks of using outdated browser versions and encourage regular updates. 5. Implement strict browser security policies, including disabling unnecessary extensions and enforcing secure browsing configurations. 6. Use endpoint detection and response (EDR) tools to monitor for suspicious activities related to browser exploitation. 7. Conduct internal audits to identify systems running the vulnerable Edge versions and prioritize their remediation. 8. Consider deploying browser isolation or sandboxing technologies to limit the impact of potential exploits.

Need more detailed analysis?Get Pro

Technical Details

Edb Id
52389
Has Exploit Code
true
Code Language
perl

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for Microsoft Edge (Chromium-based) 135.0.7049.114/.115 - Information Disclosure

# Titles: Microsoft Edge (Chromium-based) 135.0.7049.114/.115 - Information Disclosure
# Date: 08/02/2025
# Vendor: Microsoft
# Software: https://www.microsoft.com/bg-bg/edge/download?form=MA13FJ
# Reference:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49741

## Description

# CVE-2025-49741 Exploit Server
**Author:** nu11secur1ty (2025)

## Overview
This Python script simulates an exploit targeting a Microsoft Edge
(Chromium-based) information disclosure vulnerability identif
... (3186 more characters)
Code Length: 3,686 characters

Threat ID: 68900844ad5a09ad00dd9e06

Added to database: 8/4/2025, 1:09:24 AM

Last enriched: 10/27/2025, 1:41:17 AM

Last updated: 11/4/2025, 2:51:08 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats