CVE-2025-13721

Google · Google Multiple Products

A high-severity vulnerability has been discovered in Google's V8 JavaScript engine, affecting Google Chrome and other products.

Executive summary

A high-severity vulnerability has been discovered in Google's V8 JavaScript engine, affecting Google Chrome and other products. This flaw, identified as a race condition, could allow a remote attacker to execute arbitrary code on a user's system by tricking them into visiting a specially crafted malicious website, potentially leading to data theft or system compromise.

Vulnerability

The vulnerability is a race condition within the V8 JavaScript and WebAssembly engine used by Google Chrome. A race condition occurs when the timing of multiple threads or processes accessing a shared resource is not properly synchronized, leading to unexpected and insecure behavior. An attacker can exploit this by creating a malicious webpage with specific JavaScript that triggers this flawed timing, causing memory corruption which can be leveraged to execute arbitrary code within the context of the browser's sandbox.

Business impact

This vulnerability is rated as high severity with a CVSS score of 7.5. Successful exploitation could allow an attacker to execute malicious code on an employee's workstation simply by having them visit a compromised or malicious website. This could lead to the theft of sensitive corporate data, installation of malware such as ransomware or keyloggers, and could serve as an initial access point for a wider breach of the corporate network. The potential business impact includes financial loss, reputational damage, and regulatory penalties associated with a data breach.

Remediation

Immediate Action: The immediate and most effective remediation is to apply vendor-supplied security updates. All instances of Google Chrome should be updated to version 143 or later across the organization to patch the vulnerability. Following the update, security teams should monitor for any signs of exploitation attempts by reviewing endpoint detection and response (EDR) alerts and web proxy access logs for suspicious activity.

Proactive Monitoring: Security teams should monitor for indicators of compromise, including unusual outbound network connections from browser processes, unexpected process creation spawned by the browser, and alerts from security tools indicating memory corruption or shellcode execution. Reviewing web filter logs for visits to uncategorized or newly registered domains can also help identify potential targeting.

Compensating Controls: If immediate patching is not feasible, the following compensating controls can reduce risk:

  • Utilize web filtering solutions to block access to known malicious and uncategorized websites.
  • Deploy and configure script-blocking browser extensions to prevent the execution of untrusted JavaScript.
  • Ensure Endpoint Detection and Response (EDR) solutions are properly configured to detect and block browser-based exploitation techniques.
  • Reinforce user awareness training regarding phishing attacks and the danger of clicking on untrusted links.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 7.5) and the potential for remote code execution through common web browsing, this vulnerability poses a significant risk to the organization. Although it is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, this status could change quickly. We strongly recommend that all organizations prioritize the immediate deployment of the security update for Google Chrome to version 143 or later on all corporate endpoints to mitigate this threat.