Cyber Posture

CVE-2025-0438

High

Published: 15 January 2025

Published
15 January 2025
Modified
21 April 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0036 57.9th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Stack buffer overflow in Tracing in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page. (Chromium security severity: High)

Security Summary

CVE-2025-0438 is a stack buffer overflow vulnerability in the Tracing component of Google Chrome versions prior to 132.0.6834.83. The flaw, classified under CWE-121, enables potential stack corruption when a remote attacker supplies a crafted HTML page. It carries a Chromium security severity rating of High and a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating significant risk due to its network accessibility and high impacts on confidentiality, integrity, and availability.

A remote attacker with no privileges can exploit this vulnerability by tricking a user into visiting a malicious website or interacting with a crafted HTML page. Successful exploitation could lead to arbitrary code execution through stack corruption, compromising the victim's browser instance and potentially the underlying system, depending on the attacker's payload and the user's context.

Google's stable channel update advisory at https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html details the patch in Chrome 132.0.6834.83, recommending users update to this version or later to mitigate the issue. Additional technical details are available in the Chromium issue tracker at https://issues.chromium.org/issues/384186539.

Details

CWE(s)
CWE-121

Affected Products

google
chrome
≤ 132.0.6834.83

References