Google Pushes Emergency Fix for High-Severity Chrome 0-Day
- Last week, Google implemented a setting to prevent ongoing attacks targeting a critical zero-day flaw in Chrome's V8 JavaScript engine.
- The vulnerability identified as CVE-2025-5419 was discovered on May 27 by Clement Lecigne and Benoît Sevens from Google's Threat Analysis Team and had been exploited in the wild prior to the implementation of a patch.
- The vulnerability allows out-of-bounds read and write access that could let a remote attacker corrupt memory, execute code, or escape Chrome's sandbox via crafted HTML pages.
- Google addressed the vulnerability by releasing updates in Chrome versions 137.0.7151.68 and 137.0.7151.69 for Windows and macOS, with a corresponding version 137.0.7151.68 for Linux, and these fixes are being gradually distributed across all platforms in the upcoming weeks.
- This marks the third zero-day vulnerability patched by Google in Chrome during 2025, underscoring ongoing security risks and the importance of prompt user updates.
25 Articles
25 Articles
A severe vulnerability in Chrome's JavaScript V8 engine requires Google to quickly deploy a corrective update. Users must update their browser without delay to avoid any bad surprises.
Coverage Details
Bias Distribution
- 83% of the sources are Center
To view factuality data please Upgrade to Premium
Ownership
To view ownership data please Upgrade to Vantage