
Cloud Vulnerability DB
A community-led vulnerabilities database
A high-severity heap buffer overflow vulnerability (CVE-2025-11458) was discovered in Google Chrome's Sync component. The vulnerability was reported by raven from KunLun lab on September 5, 2025, and was patched in Chrome version 141.0.7390.65/.66 for Windows, Mac, and Linux platforms (Chrome Release).
The vulnerability is classified as a heap buffer overflow in the Chrome Sync component that allowed attackers to perform an out of bounds memory read via a crafted HTML page. The vulnerability has received a CVSS v3.1 base score of 8.1 (High), with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N, indicating network attack vector, low attack complexity, no privileges required, and user interaction required (Ubuntu Security).
The vulnerability poses significant security risks with high impacts on both confidentiality and integrity, though no impact on availability has been noted. The successful exploitation of this vulnerability could allow attackers to perform unauthorized memory operations, potentially leading to information disclosure or system compromise (Ubuntu Security).
Google has addressed this vulnerability in Chrome version 141.0.7390.65/.66. Users are strongly advised to update to this version or later. The fix was released on October 7, 2025, and Google awarded a $5,000 bounty to the researcher who reported this vulnerability (Chrome Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."