CVE-2025-14765
Published: 16 December 2025
Summary
CVE-2025-14765 is a high-severity Use After Free (CWE-416) vulnerability in Google Chrome. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 31.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Mandates timely identification, reporting, and correction of known flaws like the WebGPU use-after-free vulnerability via patching to Chrome 143.0.7499.147 or later.
Implements memory allocation, deallocation, and access protections to directly mitigate use-after-free errors causing heap corruption in WebGPU processing.
Requires receiving and disseminating security advisories such as Google's Chrome release notes for this CVE to enable rapid flaw remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The use-after-free vulnerability in Chrome's WebGPU enables exploitation for client execution (T1203) via a crafted HTML page, leading to heap corruption and arbitrary code execution requiring user interaction.
NVD Description
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Deeper analysisAI
CVE-2025-14765 is a use-after-free vulnerability (CWE-416) in the WebGPU component of Google Chrome prior to version 143.0.7499.147. Published on 2025-12-16, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and is classified as High severity by Chromium security. The flaw allows potential heap corruption when processing a crafted HTML page.
A remote attacker can exploit this vulnerability by luring a user to interact with a maliciously crafted HTML page, requiring no privileges but user interaction such as visiting the page or granting permissions. Successful exploitation could lead to heap corruption, enabling high-impact consequences including unauthorized access to sensitive data, modification of system integrity, and disruption of availability.
Google's stable channel update for desktop, available at https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_16.html, addresses the issue in Chrome 143.0.7499.147 and later versions. Additional details are provided in the Chromium issue tracker at https://issues.chromium.org/issues/448294721. Practitioners should prioritize updating affected Chrome installations to mitigate the risk.
Details
- CWE(s)