This high-severity issue in Google Chromium involves insufficient policy enforcement in the Loader component, enabling remote attackers to leak cross-origin data via crafted HTML pages. The Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-4664 to its Known Exploited Vulnerabilities Catalog as the vulnerability is actively exploited in the wild in attacks. The vulnerability poses significant risks, including unauthorized data leakage across web origins, which could compromise user privacy and security. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Google responded by rolling out a Stable Channel update for Chrome on May 15, 2025, addressing the vulnerability across desktop platforms (Windows, Mac, and Linux). This flaw allows a remote attacker to leak cross-origin data via a crafted HTML page, bypassing security policies. The vulnerability stems from an incorrect handle provided under unspecified circumstances in Chrome’s Mojo Inter-Process Communication (IPC) layer, potentially leading to unauthorized code execution or sandbox escape. The analysis covers the vulnerability’s nature, impact, mitigation strategies, and contextual details, aiming to inform users and organizations about the risks and necessary actions. CVE-2025-4664 is classified as an insufficient policy enforcement vulnerability in the Chromium Loader component. This vulnerability affects Google Chromium, the foundation for browsers like Google Chrome, Microsoft Edge, and Opera. CISA urges users to follow Google’s patch instructions, updating to the latest Chrome versions: 136.0.7103.113/.114 for Windows and Mac, and 136.0.7103.113 for Linux. CISA recommends applying mitigations per vendor instructions, following applicable BOD 22-01 guidance for cloud services, or discontinuing use of the product if mitigations are unavailable. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security. Given its classification as a zero-day flaw, it was exploited before Google released the patch, heightening the urgency for mitigation. Regular security assessments and user education on safe browsing practices are also recommended to mitigate risks.
This Cyber News was published on cybersecuritynews.com. Publication date: Fri, 16 May 2025 03:54:54 +0000