PT-2025-27478 · Google +1 · Google Chrome +2
Clément Lecigne
·
Published
2025-06-30
·
Updated
2025-07-25
·
CVE-2025-6554
10
High
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
**Name of the Vulnerable Software and Affected Versions:**
Google Chrome versions prior to 138.0.7204.96
**Description:**
A type confusion vulnerability exists in the V8 JavaScript engine in Google Chrome, prior to version 138.0.7204.96. This flaw allows a remote attacker to perform arbitrary read/write operations via a crafted HTML page. This vulnerability is actively exploited in the wild and has been observed being used to target high-risk individuals with spyware. The vulnerability allows attackers to execute arbitrary code, potentially leading to remote code execution (RCE). Exploitation has been observed through phishing sites targeting cryptocurrency wallet data.
**Recommendations:**
Update Google Chrome to version 138.0.7204.96 or later.
Exploit
Fix
DoS
RCE
Type Confusion
Weakness Enumeration
Related Identifiers
Affected Products
References · 206
- 🔥 https://github.com/9Insomnie/CVE-2025-6554⭐ 1 🔗 1 · Exploit
- https://osv.dev/vulnerability/DSA-5955-1 · Vendor Advisory
- https://security-tracker.debian.org/tracker/CVE-2025-6554 · Vendor Advisory
- https://safe-surf.ru/specialists/bulletins-nkcki/722440 · Security Note
- https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html?m=1 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/722694 · Security Note
- https://security-tracker.debian.org/tracker/source-package/chromium · Vendor Advisory
- https://safe-surf.ru/specialists/bulletins-nkcki/722434 · Security Note
- https://bdu.fstec.ru/vul/2025-07783 · Security Note
- https://osv.dev/vulnerability/CVE-2025-6554 · Vendor Advisory
- https://security-tracker.debian.org/tracker/DSA-5955-1 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6554 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-6554 · Security Note
- https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html · Vendor Advisory
- https://twitter.com/EthHackingNews/status/1940414338000708051 · Twitter Post