
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free vulnerability (CVE-2025-6555) was discovered in the Animation component of Google Chrome versions prior to 138.0.7204.49. The vulnerability was reported by security researcher Lyra Rebane on March 30, 2025, and was officially disclosed on June 24, 2025. This medium-severity vulnerability affects Chrome browsers across Windows, Mac, and Linux platforms (Chrome Release, Wiz Report).
The vulnerability is classified as a use-after-free flaw (CWE-416) in Chrome's Animation component, which handles CSS animations, JavaScript-driven animations, and other dynamic visual effects within web pages. Use-after-free vulnerabilities occur when a program continues to use a memory pointer after the memory it points to has been freed or deallocated. The vulnerability has been assigned a CVSS v3.1 base score of 5.4 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N (NVD, Wiz Report).
The vulnerability allows remote attackers to potentially exploit heap corruption via a crafted HTML page. This could lead to arbitrary code execution within the browser's security context, potentially compromising the integrity and confidentiality of user data (Wiz Report).
Google has released Chrome version 138.0.7204.49 to address this vulnerability. Users are strongly encouraged to update their Chrome browsers immediately. The update is being rolled out gradually across Windows, Mac, and Linux platforms. Users can manually update by navigating to Chrome's settings (chrome://settings/help) and clicking the update button when version 138.0.7204.49 becomes available (Chrome Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."