top of page

Google Addresses Critical Chrome Vulnerability Actively Exploited in the Wild

  • Nov 18, 2025
  • 2 min read

Key Findings


  • Google released security updates for Chrome to address two security flaws, including one that is being actively exploited in the wild.

  • The actively exploited vulnerability is CVE-2025-13223, a type confusion vulnerability in the V8 JavaScript and WebAssembly engine that could lead to arbitrary code execution or program crashes.

  • Clément Lecigne of Google's Threat Analysis Group (TAG) discovered and reported the flaw on November 12, 2025.

  • Google has not provided details on who is behind the attacks or who may have been targeted.

  • CVE-2025-13223 is the third actively exploited type confusion bug discovered in V8 this year.


Background


  • Google's Chrome browser is one of the most widely used web browsers, with a significant user base.

  • The V8 JavaScript and WebAssembly engine is a critical component of Chrome, responsible for executing JavaScript and WebAssembly code.

  • Type confusion vulnerabilities in the V8 engine have been a recurring issue, as they can lead to serious security consequences, including arbitrary code execution.


Details on the Vulnerabilities


  • CVE-2025-13223 is a type confusion vulnerability in the V8 engine that could be exploited to achieve arbitrary code execution or program crashes.

  • Google has confirmed that an exploit for CVE-2025-13223 exists in the wild, indicating that it is actively being exploited.

  • In addition to CVE-2025-13223, Google also patched another type confusion vulnerability in V8 (CVE-2025-13224), which was flagged by its AI agent, Big Sleep.

  • Both CVE-2025-13223 and CVE-2025-13224 have a CVSS score of 8.8, indicating a high severity.


Mitigating the Threats


  • Google has released security updates for Chrome to address these vulnerabilities, and users are advised to update their browsers to the latest versions:

  • Windows: 142.0.7444.175/.176

  • macOS: 142.0.7444.176

  • Linux: 142.0.7444.175

  • Users can navigate to "More > Help > About Google Chrome" and select "Relaunch" to ensure the latest updates are installed.

  • Users of other Chromium-based browsers, such as Microsoft Edge, Brave, Opera, and Vivaldi, are also advised to apply the fixes as they become available.


Conclusion


The discovery of an actively exploited Chrome zero-day vulnerability in the V8 engine is a significant security concern. Google's prompt response in releasing a security update to address the issue is commendable, and users should prioritize updating their browsers to stay protected against this threat.


Sources


  • https://thehackernews.com/2025/11/google-issues-security-fix-for-actively.html

  • https://securityonline.info/google-patches-actively-exploited-chrome-zero-day-flaw-cve-2025-13223-in-emergency-update/

  • https://www.itsecuritynews.info/google-issues-security-fix-for-actively-exploited-chrome-v8-zero-day-vulnerability/

  • https://www.msn.com/en-gb/money/technology/google-quietly-released-a-security-fix-for-a-worrying-chrome-zero-day-flaw-so-patch-now/ar-AA1G649C?apiversion=v2&noservercache=1&domshim=1&renderwebcomponents=1&wcseo=1&batchservertelemetry=1&noservertelemetry=1

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page