CVE-2025-0611
vulnerability analysis and mitigation

Overview

Object corruption vulnerability (CVE-2025-0611) was discovered in Google Chrome's V8 JavaScript engine prior to version 132.0.6834.110. The vulnerability was reported by security researcher 303f06e3 on December 26, 2024, and was publicly disclosed on January 22, 2025. This high-severity flaw affects Chrome browsers across Windows, Mac, and Linux operating systems (Chrome Release).

Technical details

The vulnerability is classified as a Heap-based Buffer Overflow (CWE-122) that allows object corruption in the V8 JavaScript engine. The severity is rated as High with a CVSS 3.1 Base Score of 8.2, and vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H, indicating network accessibility with low attack complexity and no required privileges or user interaction (NVD Database).

Impact

Successful exploitation of this vulnerability could lead to arbitrary code execution, potentially granting attackers complete control over the affected system. The vulnerability can be triggered via a crafted HTML page, which could result in heap corruption (Security Online).

Mitigation and workarounds

Google has released version 132.0.6834.110/111 for Windows and Mac, and 132.0.6834.110 for Linux to address this vulnerability. Users are strongly advised to update their Chrome browsers immediately to the latest version. The update can be applied by opening Chrome, clicking the three vertical dots in the top right corner, navigating to Help, and selecting About Google Chrome (Security Online).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management