Cyber Posture

CVE-2025-0762

High

Published: 29 January 2025

Published
29 January 2025
Modified
21 April 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0037 59.0th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-0762 is a high-severity Use After Free (CWE-416) vulnerability in Google Chrome. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked in the top 41.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 CM-11 (User-installed Software) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the use-after-free vulnerability by requiring timely remediation through patching Chrome to version 132.0.6834.159 or later.

prevent

Prevents exploitation by enforcing organizational controls on user-installed software, blocking or monitoring installation of crafted malicious Chrome Extensions.

prevent

Implements memory safeguards such as address space layout randomization or data execution prevention to mitigate heap corruption from use-after-free in DevTools.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

UAF in Chrome DevTools enables RCE via crafted malicious extension (client-side exploitation).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Use after free in DevTools in Google Chrome prior to 132.0.6834.159 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Medium)

Deeper analysisAI

CVE-2025-0762 is a use-after-free vulnerability (CWE-416) in the DevTools component of Google Chrome prior to version 132.0.6834.159. This flaw allows a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. The issue carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and is rated Medium severity by Chromium security.

A remote attacker with no privileges can exploit this vulnerability by convincing a user to interact with a maliciously crafted Chrome Extension, such as through installation or usage triggered by a webpage. Successful exploitation could result in heap corruption, enabling high-impact compromise of confidentiality, integrity, and availability, potentially leading to arbitrary code execution within the browser context.

Google has mitigated this vulnerability in Chrome stable channel version 132.0.6834.159. Security practitioners should advise users to update immediately to this version or later. Additional details are available in the Chrome Releases announcement at https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_28.html and the Chromium issue tracker at https://issues.chromium.org/issues/384844003.

Details

CWE(s)

Affected Products

google
chrome
≤ 132.0.6834.159

CVEs Like This One

CVE-2025-0997Same product: Google Chrome
CVE-2026-6315Same product: Google Chrome
CVE-2025-1916Same product: Google Chrome
CVE-2026-6319Same product: Google Chrome
CVE-2026-6358Same product: Google Chrome
CVE-2025-0995Same product: Google Chrome
CVE-2025-2136Same product: Google Chrome
CVE-2026-6359Same product: Google Chrome
CVE-2025-1006Same product: Google Chrome
CVE-2025-2476Same product: Google Chrome

References