CVE-2025-13632
BaseFortify
Publication date: 2025-12-02
Last updated on: 2025-12-04
Assigner: Chrome
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| chrome | to 143.0.7499.40 (exc) | |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| chrome | to 143.0.7499.40 (exc) | |
| apple | macos | * |
| microsoft | windows | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-194 | The product performs an operation on a number that causes it to be sign extended when it is transformed into a larger data type. When the original number is negative, this can produce unexpected values that lead to resultant weaknesses. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update Google Chrome to version 143.0.7499.41 or later to ensure the fix is applied. Additionally, avoid installing untrusted or malicious Chrome extensions to prevent exploitation.
Can you explain this vulnerability to me?
This vulnerability is due to an inappropriate implementation in DevTools in Google Chrome versions prior to 143.0.7499.41. It allows an attacker who convinces a user to install a malicious Chrome extension to potentially escape the browser's sandbox environment by using a specially crafted extension.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an attacker to break out of the Chrome sandbox, potentially gaining higher privileges on the user's system or accessing sensitive information that should be protected by the sandbox.