Fixing and finding
Jump to remediation plan
CVE ID

CVE-2025-13223

Published 2025-11-18
Updated 5 months ago
Vendor/s
Google
Product/s
Chromium V8
Version/s
* > 142.0.7444.175
KEV Status
Active Exploitation
Listed in CISA's Known Exploited Vulnerabilities catalogue. Active exploitation observed in the wild.
CVSS Score (v3.1)
8.8
/ 10
High
Severity Details
Base score
8.8 High
Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Description

CVE-2025-13223 is a high-severity (8.8) type confusion vulnerability in Google Chrome's V8 engine being exploited in the wild. Update to 142.0.7444.175.

CPE

Google logo
Google
Product Version Start Version End (excl.) Status
chrome * 142.0.7444.175 vulnerable
macos - - unaffected
linux_kernel - - unaffected
windows - - unaffected

Related weakness (CWE)

CWE-843, CWE-843

Remediation plan

1

Apply official patches

Immediately apply the security updates provided by Google for the Chrome browser across all platforms, including Windows, macOS, and Linux, to address the V8 engine flaw.

2

Update affected systems

Ensure all Chrome installations are updated to version 142.0.7444.175 or later. Verify that Chromium-based browsers like Microsoft Edge or Brave are also updated to their respective patched versions.

3

Restrict access

Implement robust web filtering and URL categorization to block access to known malicious or untrusted domains that may host the crafted HTML pages required for this attack vector.

4

Monitor for exploitation

Use endpoint detection and response (EDR) tools to monitor for unusual child processes spawned by browser processes or frequent, unexplained renderer crashes which may indicate heap corruption attempts.

Detection Guidance

Security teams should monitor for unusual process behavior originating from chrome.exe or equivalent binaries, such as the execution of shell commands or unexpected outbound network connections. Organizations should audit their environment for any Chrome instances below version 142.0.7444.175. Additionally, look for log entries indicating frequent renderer process crashes, which can be a precursor to or a result of successful heap corruption and type confusion exploitation.

References

Sources

NIST National Vulnerability Database (NVD)
CISA Known Exploited Vulnerabilities (KEV)

Experience superior visibility and a simpler approach to cyber risk management