
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2025-5419 is a high-severity vulnerability discovered in Google Chrome's V8 JavaScript and WebAssembly engine. The vulnerability was reported by Clement Lecigne and Benoît Sevens of Google's Threat Analysis Group on May 27, 2025, and involves out-of-bounds read and write operations that could allow remote attackers to exploit heap corruption via crafted HTML pages. The issue affects Google Chrome versions prior to 137.0.7151.68 (Chrome Release, Hacker News).
The vulnerability is classified as a high-severity issue with a CVSS score of 8.8 (HIGH) and vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. It has been categorized under two CWE classifications: CWE-787 (Out-of-bounds Write) and CWE-125 (Out-of-bounds Read). The flaw specifically affects the V8 engine, Chrome's JavaScript and WebAssembly processing component, where memory corruption issues could lead to arbitrary code execution (Security Online, NVD).
The vulnerability allows attackers to potentially execute arbitrary code on victims' systems through out-of-bounds memory operations. The out-of-bounds read and write capabilities can enable attackers to manipulate memory in unintended ways, potentially leading to arbitrary code execution or browser sandbox escapes (Cybersecurity News, Security Online).
Google has released Chrome version 137.0.7151.68/.69 for Windows and Mac, and version 137.0.7151.68 for Linux to address this vulnerability. The issue was initially mitigated on May 28, 2025, through a configuration change pushed to the Stable channel across all Chrome platforms. Users are strongly advised to update their browsers immediately by navigating to Settings > About Chrome to verify and install the latest version (Chrome Release, Security Online).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”