Cyber Posture

CVE-2025-13633

High

Published: 02 December 2025

Published
02 December 2025
Modified
04 December 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0009 25.1th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in client applications to execute code.

Security Summary

CVE-2025-13633 is a use-after-free vulnerability (CWE-416) in the Digital Credentials component of Google Chrome prior to version 143.0.7499.41. The flaw enables a remote attacker who has compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. Chromium security rates it as High severity, with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).

A remote attacker can exploit this vulnerability over the network with low attack complexity and no privileges required, though user interaction is necessary, such as rendering a malicious HTML page in the browser. Assuming prior compromise of the renderer process, successful exploitation leads to heap corruption, enabling high-impact effects on confidentiality, integrity, and availability.

Google's Chrome stable channel update to version 143.0.7499.41 and later addresses the issue, as detailed in the Chrome Releases blog post at https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop.html and Chromium issue tracker entry at https://issues.chromium.org/issues/458082926. Security practitioners should prioritize updating affected Chrome installations.

Details

CWE(s)
CWE-416

Affected Products

google
chrome
≤ 143.0.7499.40 · ≤ 143.0.7499.40

MITRE ATT&CK Enterprise Techniques

T1189 Drive-by Compromise Initial Access
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Use-after-free vulnerability in Chrome renderer exploited via crafted HTML page enables drive-by compromise (T1189) and exploitation for client execution (T1203) with remote access, low complexity, and user interaction via browser rendering.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References