CVE-2025-10892
vulnerability analysis and mitigation

Overview

Integer overflow vulnerability (CVE-2025-10892) was discovered in the V8 JavaScript engine of Google Chrome prior to version 140.0.7339.207. The vulnerability was reported by Google Big Sleep on September 10, 2025, and was classified as a high-severity security issue (Chrome Release, NVD).

Technical details

The vulnerability is an integer overflow condition within Chrome's V8 JavaScript engine that could potentially lead to heap corruption when triggered by a specially crafted HTML page. The issue received a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating a serious security risk (NVD, GBHackers).

Impact

Successful exploitation of this vulnerability could allow attackers to execute arbitrary code, crash the browser, or potentially gain unauthorized access to system resources. The V8 engine processes JavaScript code from every website users visit, making this vulnerability particularly critical for user security (GBHackers).

Mitigation and workarounds

Google has released Chrome version 140.0.7339.207/.208 for Windows/Mac and 140.0.7339.207 for Linux to address this vulnerability. Users are strongly advised to update their browsers immediately through Chrome's automatic update mechanism or manually by navigating to Chrome's settings menu and selecting 'About Chrome' (GBHackers).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management