Cyber Posture

CVE-2025-12727

High

Published: 10 November 2025

Published
10 November 2025
Modified
25 November 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0011 29.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-12727 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Google Chrome. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 29.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and correction of the V8 heap corruption flaw by patching Google Chrome to version 142.0.7444.137 or later.

prevent

Implements memory safeguards such as address space layout randomization and data execution prevention to protect against heap corruption from out-of-bounds writes in V8.

detect

Mandates vulnerability scanning to identify systems running vulnerable Chrome versions prior to 142.0.7444.137, enabling proactive remediation.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

The vulnerability in the V8 JavaScript engine allows remote exploitation of heap corruption via a crafted HTML page, directly enabling Exploitation for Client Execution (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Inappropriate implementation in V8 in Google Chrome prior to 142.0.7444.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Deeper analysisAI

CVE-2025-12727 stems from an inappropriate implementation in the V8 JavaScript engine within Google Chrome prior to version 142.0.7444.137. This vulnerability enables a remote attacker to potentially exploit heap corruption via a crafted HTML page. Chromium rates its security severity as High, with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), and it maps to CWE-787 (Out-of-bounds Write).

A remote attacker without privileges can exploit this by luring a user to interact with a malicious site hosting the crafted HTML page. User interaction is required, but no authentication is needed, allowing network-accessible exploitation with low complexity. Successful attacks could result in high impacts to confidentiality, integrity, and availability through heap corruption.

Mitigation involves updating to Google Chrome 142.0.7444.137 or later, as detailed in the stable channel update on the Chrome Releases blog (https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop.html) and the associated Chromium issue (https://issues.chromium.org/issues/454485895).

Details

CWE(s)

Affected Products

google
chrome
≤ 142.0.7444.134 · ≤ 142.0.7444.135

CVEs Like This One

CVE-2026-4450Same product: Apple Macos
CVE-2025-9132Same product: Apple Macos
CVE-2025-8901Same product: Apple Macos
CVE-2025-13042Same product: Apple Macos
CVE-2026-3909Same product: Apple Macos
CVE-2026-6314Same product: Apple Macos
CVE-2026-5860Same product: Apple Macos
CVE-2026-7349Same product: Apple Macos
CVE-2026-0902Same product: Apple Macos
CVE-2026-4459Same product: Apple Macos

References