CVE-2025-8578
Published: 07 August 2025
Summary
CVE-2025-8578 is a high-severity Use After Free (CWE-416) vulnerability in Google Chrome. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 49.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely patching of the use-after-free flaw in Chrome's Cast component via software updates to version 139.0.7258.66 or later.
Implements memory protections like ASLR and DEP to mitigate heap corruption resulting from the use-after-free vulnerability.
Vulnerability scanning detects outdated Chrome installations vulnerable to exploitation via crafted HTML pages.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Use-after-free in Chrome Cast component enables RCE via malicious HTML page (drive-by), directly mapping to Exploitation for Client Execution.
NVD Description
Use after free in Cast in Google Chrome prior to 139.0.7258.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Deeper analysisAI
CVE-2025-8578 is a use-after-free vulnerability (CWE-416) in the Cast component of Google Chrome prior to version 139.0.7258.66. Published on 2025-08-07, it allows potential heap corruption via a crafted HTML page, with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and Chromium security severity rated as Medium.
A remote attacker without privileges can exploit this vulnerability by tricking a user into visiting a malicious website with a crafted HTML page. The low attack complexity requires user interaction but no special scope changes, potentially leading to high impacts on confidentiality, integrity, and availability through heap corruption.
Mitigation is available via the Google Chrome stable channel update to version 139.0.7258.66 or later, as announced in the Chrome Releases blog at https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop.html. Additional technical details are provided in the Chromium issue tracker at https://issues.chromium.org/issues/423387026.
Details
- CWE(s)