PT-2025-47217 · Google+3 · Google Chrome+4
Published
2025-11-17
·
Updated
2026-02-13
·
CVE-2025-13223
CVSS v2.0
10
10
High
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Chromium versions prior to 142.0.7444.175
Opera versions prior to 124.0.5705.42
Opera GX versions prior to 124.0.5705.38
Opera Air versions prior to 122.0.5643.196
Opera Neon versions prior to 124.0.5705.44
Opera for Android versions prior to 92.6
Description
A type confusion vulnerability exists in the V8 JavaScript and WebAssembly engine used in Chromium and Chromium-based browsers. This flaw allows a remote attacker to potentially exploit heap corruption via a crafted HTML page, potentially leading to arbitrary code execution. The vulnerability is actively exploited in the wild, and an exploit exists. The issue affects a wide range of systems, potentially impacting a large number of users. The vulnerability is related to improper handling of V8 objects, creating a path for remote code execution.
Recommendations
Update Chromium to version 142.0.7444.175 or later.
Update Opera to version 124.0.5705.42 or later.
Update Opera GX to version 124.0.5705.38 or later.
Update Opera Air to version 122.0.5643.196 or later.
Update Opera Neon to version 124.0.5705.44 or later.
Update Opera for Android to version 92.6 or later.
Fix
RCE
Type Confusion
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
ALT-PU-2025-15267
BDU:2025-14497
CVE-2025-13223
DSA-6060-1
Affected Products
Alt Linux
Debian
Google Chrome
Red Os
V8
References · 126
- https://security-tracker.debian.org/tracker/CVE-2025-13223 · Vendor Advisory
- http://repo.red-soft.ru/redos/7.3c/x86_64/updates · Vendor Advisory
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13223 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-13223 · Security Note
- https://osv.dev/vulnerability/DEBIAN-CVE-2025-13223 · Vendor Advisory
- https://wiki.astralinux.ru/astra-linux-se17-bulletin-2025-1202SE17 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-14497 · Security Note
- https://wiki.astralinux.ru/astra-linux-se47-bulletin-2025-1216SE190 · Vendor Advisory
- https://wiki.astralinux.ru/astra-linux-se16-bulletin-20251225SE16 · Vendor Advisory
- https://twitter.com/shah_sheikh/status/1990714849005887733 · Twitter Post
- https://twitter.com/The_Cyber_News/status/1990651094125457468 · Twitter Post
- https://crbug.com/460017370 · Note
- https://twitter.com/connecti/status/1993641386650783923 · Twitter Post
- https://t.me/true_secator/7634 · Telegram Post
- https://twitter.com/CloneSystemsInc/status/1990801698164486350 · Twitter Post