
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-5419 is a high-severity out-of-bounds read and write vulnerability discovered in V8, the JavaScript and WebAssembly engine used in Google Chrome. The vulnerability was reported on May 27, 2025, by Clement Lecigne and Benoît Sevens of Google's Threat Analysis Group, and it affects Google Chrome versions prior to 137.0.7151.68. The flaw allows remote attackers to potentially exploit heap corruption through a crafted HTML page (Help Net Security, Chrome Releases).
The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (High) with the following vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. It is classified under two CWE categories: CWE-787 (Out-of-bounds Write) and CWE-125 (Out-of-bounds Read). The flaw specifically affects the V8 engine, which is responsible for processing JavaScript and WebAssembly code in Chrome and Chromium-based browsers (NVD).
The vulnerability allows remote attackers to potentially exploit heap corruption, which could lead to arbitrary code execution. The high CVSS score indicates that successful exploitation could result in significant impacts on confidentiality, integrity, and availability of the affected systems. The vulnerability affects all Chrome users on Windows, Mac, and Linux platforms (Hacker News).
Google has released patches in Chrome version 137.0.7151.68 for Windows and Linux, and version 137.0.7151.69 for macOS. The issue was initially mitigated on May 28, 2025, through a configuration change pushed to the Stable channel across all Chrome platforms. Users are strongly advised to update their browsers immediately. The vulnerability also affects other Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi, which are expected to release their respective patches (Help Net Security).
The vulnerability has been added to CISA's Known Exploited Vulnerabilities catalog, requiring federal agencies to apply patches by June 26, 2025. The security community has noted the quick response from Google in addressing the vulnerability, with the initial mitigation being deployed within a day of discovery (Help Net Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."