CVE-2025-10891

Google · Google Multiple Products

A high-severity vulnerability has been identified in the V8 JavaScript engine used by Google Chrome and other Google products.

Executive summary

A high-severity vulnerability has been identified in the V8 JavaScript engine used by Google Chrome and other Google products. This flaw, an integer overflow, can be exploited by a remote attacker who tricks a user into visiting a specially crafted webpage, potentially allowing the attacker to execute arbitrary code and compromise the user's system.

Vulnerability

The vulnerability is an integer overflow condition within the V8 JavaScript engine. An attacker can create a malicious webpage containing specially crafted JavaScript code. When a user navigates to this page using a vulnerable version of Google Chrome, the V8 engine incorrectly handles a large integer value during a calculation, causing it to "wrap around" or exceed its allocated memory space. This memory corruption can be leveraged by the attacker to overwrite adjacent memory, leading to a crash or, more critically, allowing for arbitrary code execution in the context of the sandboxed browser process. A sophisticated exploit could potentially chain this with another vulnerability to escape the browser sandbox and gain full control over the underlying operating system.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation could lead to a significant business impact, including the compromise of sensitive corporate data, intellectual property, and employee credentials. An attacker could deploy malware, such as ransomware or spyware, on an employee's workstation, using it as a beachhead to move laterally across the corporate network. Given the ubiquitous nature of web browsers in a corporate environment, the attack surface is extensive, posing a direct risk to data confidentiality, integrity, and availability.

Remediation

Immediate Action: All systems running vulnerable versions of Google Chrome must be updated to version 140 or later immediately. This action should be prioritized for all user workstations and servers with browser access. Following the update, security teams should actively monitor for any signs of exploitation attempts and review web proxy and endpoint logs for indicators of compromise related to this vulnerability.

Proactive Monitoring: Monitor endpoint security logs (EDR) for suspicious child processes being spawned by chrome.exe (e.g., cmd.exe, powershell.exe). Network monitoring should be configured to detect and alert on unusual outbound traffic from workstations to unknown or suspicious IP addresses or domains. Review web gateway logs for access attempts to uncategorized or newly registered domains.

Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:

  • Utilize web filtering solutions to block access to malicious and uncategorized websites.
  • Ensure endpoint protection (AV/EDR) solutions are up-to-date with the latest signatures and behavioral detection rules.
  • Deploy script-blocking browser extensions to prevent the automatic execution of potentially malicious JavaScript.
  • Reinforce user security awareness training, emphasizing caution with suspicious links and websites.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8 and the potential for remote code execution, this vulnerability poses a critical risk to the organization. Although it is not currently listed on the CISA KEV catalog and no public exploits are available, the widespread use of Google Chrome makes it a high-priority target. We strongly recommend that all organizations prioritize the immediate deployment of the security update for Google Chrome (version 140 or later) across all managed endpoints. The patching process should be tracked to ensure 100% compliance.