
Cloud Vulnerability DB
A community-led vulnerabilities database
A high-severity vulnerability (CVE-2025-2783) was discovered in Google Chrome's Mojo component on Windows systems prior to version 134.0.6998.177. The vulnerability, reported by Boris Larin and Igor Kuznetsov of Kaspersky on March 20, 2025, involves an incorrect handle provided in unspecified circumstances that allows remote attackers to perform a sandbox escape via a malicious file (Chrome Release, NVD).
The vulnerability has been assigned a CVSS v3.1 base score of 8.3 (High) with the following vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H. The technical flaw exists in the Mojo component of Chrome on Windows systems, allowing attackers to bypass the browser's sandbox protection mechanisms. According to Kaspersky researchers, the vulnerability could be exploited without performing obviously malicious or forbidden actions, effectively rendering Chrome's sandbox protection ineffective (Bleeping Computer).
The vulnerability enables attackers to escape Chrome's sandbox protection and execute malicious code on the target system. When successfully exploited, it allows for the deployment of sophisticated malware as part of cyber-espionage campaigns. This is particularly significant as it represents the first Chrome zero-day patched in 2025 (Bleeping Computer).
Google has released patches for the vulnerability in Chrome version 134.0.6998.177/.178 for Windows users. The update is being rolled out globally, and users can manually check for updates or wait for the automatic update process. Users are strongly advised to update their Chrome browsers immediately to protect against potential attacks (Chrome Release).
The discovery of this zero-day vulnerability has raised significant concerns in the cybersecurity community, particularly due to its active exploitation in targeted espionage campaigns. Kaspersky researchers have expressed surprise at the effectiveness of the exploit, noting how it could bypass Chrome's sandbox protection without obvious malicious activity (Bleeping Computer).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."