8.8
CVSSv3

CVE-2025-5419

CVSSv4: NA | CVSSv3: 8.8 | CVSSv2: NA | VMScore: 980 | EPSS: 0.00642 | KEV: Exploitation Reported
Published: 03/06/2025 Updated: 04/06/2025

Vulnerability Summary

Out-of-Bounds Read/Write in Google Chrome V8 Enables Remote Heap Corruption

A vulnerability exists in the V8 JavaScript engine of Google Chrome versions before 137.0.7151.68. The flaw involves out of bounds read and write issues that could enable a remote attacker to potentially cause heap corruption through a specially crafted HTML page. The security severity is classified as high by Chromium, indicating significant risk to users.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google chrome

Vendor Advisories

A new LTS  version 13206834225 (Platform Version: 160931070), is being rolled out for most ChromeOS devices This version includes selected security fixes including:415810136 High CVE-2025-4664 Insufficient policy enforcement in Loader420636529 High CVE-2025-5419 Out of bounds read and write in V8Fixes for CVE-2024-53164, CVE-2024-56 ...
 The Stable channel has been updated to 1370715168/69 for Windows, Mac and 1370715168 for Linux which will roll out over the coming days/weeks A full list of changes in this build is available in the Log Security Fixes and RewardsNote: Access to bug details and links may be kept restricted until a majority of ...

Github Repositories

Out-of-Bounds Read/Write in Chrome V8 — Heap Corruption → RCE

CVE-2025-5419 Out-of-Bounds Read/Write in Chrome V8 — Heap Corruption → RCE This PoC is provided for educational and research purposes only Download

Remote Code Execution via Out-of-Bounds Write in Google Chrome V8 (CVE-2025-5419) 🧠 Description This repository contains a proof-of-concept (PoC) exploit for a CVE-2025-5419, a critical out-of-bounds write vulnerability discovered in the V8 JavaScript engine used by Google Chrome The flaw was present in versions up to 1370715168 The vulnerability arises when V8 improper

Remote Code Execution via Out-of-Bounds Write in Google Chrome V8 (CVE-2025-5419) 🧠 Description This repository contains a proof-of-concept (PoC) exploit for a CVE-2025-5419, a critical out-of-bounds write vulnerability discovered in the V8 JavaScript engine used by Google Chrome The flaw was present in versions up to 1370715168 The vulnerability arises when V8 improper

马斯克:巨大的过度支出将使美国成为债务奴隶 - 📰 null - 【马斯克:巨大的过度支出将使美国成为债务奴隶】金色财经报道,马斯克在 X 上发文表示,“巨大的过度支出将使美国成为债务奴隶。” Anthropic:研究与整合功能已对 Pro 用户开放 - 📰 null - 【Anthropic:研究与整合功能已

Out-of-Bounds Read/Write in Chrome V8 — Heap Corruption → RCE

CVE-2025-5419 Out-of-Bounds Read/Write in Chrome V8 — Heap Corruption → RCE This PoC is provided for educational and research purposes only Download

Recent Articles

Google patches new Chrome zero-day bug exploited in attacks
BleepingComputer • Sergiu Gatlan • 03 Jun 2025

Google patches new Chrome zero-day bug exploited in attacks By Sergiu Gatlan June 3, 2025 06:22 AM 0 Google has released an emergency security update to fix the third Chrome zero-day vulnerability exploited in attacks since the start of the year. "Google is aware that an exploit for CVE-2025-5419 exists in the wild," the company warned in a security advisory published on Monday. This high-severity vulnerability is caused by an out-of-bounds read and write weakn...

Microsoft warns of 66 flaws to fix for this Patch Tuesday, and two are under active attack
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Stealthy Falcon swoops on WebDAV and Redmond's even patching IE!

Patch Tuesday It's Patch Tuesday time again, and Microsoft is warning that there are a bunch of critical fixes to sort out - and two actively exploited bugs. Redmond reported 66 flaws to be fixed in its monthly patch bundle, including one that was a zero-day until 1000 Pacific Time today. There are ten critical patches, but two of the important ones are under active exploitation, and Microsoft has taken the unusual step of issuing patches for one bug all the way back to out-of-support platforms ...

Google quietly pushes emergency fix for Chrome 0-day as exploit runs wild
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources TAG team spotted the V8 bug first, so you can bet nation-states weren’t far behind

Google revealed Monday that it had quietly deployed a configuration change last week to block active exploitation of a Chrome zero-day. Google Threat Analysis Group (TAG) team members Clement Lecigne and Benoît Sevens spotted the high-severity bug, tracked as CVE-2025-5419, on May 27. It's an out-of-bounds read and write vulnerability in Chrome's V8 JavaScript engine that could allow a remote attacker to corrupt memory and potentially hijack execution via a booby-trapped HTML page. Attackers co...