
CVE-2025-5419 is a recently disclosed high-severity vulnerability affecting Google Chrome’s V8 JavaScript engine. This out-of-bounds read and write flaw allows remote attackers to potentially exploit heap corruption via crafted HTML pages. The vulnerability has been actively exploited in the wild, prompting Google to release an emergency update to address the issue.
Vulnerability Details
- CVE ID: CVE-2025-5419
- Affected Software: Google Chrome
- Affected Versions: Versions prior to 137.0.7151.68
- CWE Identifiers:
- CWE-787: Out-of-bounds Write
- CWE-125: Out-of-bounds Read
- CVSS v3.1 Score: 8.8 (High)
- Attack Vector: Network
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Exploitation Path
The vulnerability resides in Chrome’s V8 engine, where improper handling of memory operations can lead to out-of-bounds read and write conditions. An attacker can craft a malicious HTML page that, when visited by a user, triggers the vulnerability, leading to heap corruption. This can result in arbitrary code execution, potentially allowing the attacker to take control of the affected system. The exploit requires user interaction, such as visiting a malicious website.
Mitigation Steps
To protect against CVE-2025-5419:
- Update Google Chrome: Ensure that Chrome is updated to version 137.0.7151.68 or later. For Windows and macOS, the updated version is 137.0.7151.68/.69, and for Linux, it’s 137.0.7151.68. You can check your Chrome version and update by navigating to Settings > About.
- Restart the Browser: After updating, restart Chrome to apply the changes.
- Stay Informed: Monitor official channels for any further updates or advisories related to this vulnerability.
References & Attribution
1. NVD Entry for CVE-2025-5419 – National Vulnerability Database summary
https://nvd.nist.gov/vuln/detail/CVE-2025-5419
2. https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop.html
3. https://www.theregister.com/2025/06/03/google_chrome_zero_day_emergency_fix/
4. MITRE CVE Program – Source of CVE metadata and classification
© 1999–2025 The MITRE Corporation. Licensed under the MITRE CVE Terms of Use.