PT-2025-27478 · Google +1 · V8 Javascript Engine +2
Clément Lecigne
·
Published
2025-06-30
·
Updated
2025-07-17
·
CVE-2025-6554
10
High
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
**Name of the Vulnerable Software and Affected Versions:**
Google Chrome versions prior to 138.0.7204.96
**Description:**
A type confusion vulnerability exists in the V8 JavaScript engine in Google Chrome, prior to version 138.0.7204.96. This flaw allows a remote attacker to perform arbitrary read/write operations via a crafted HTML page, potentially leading to remote code execution (RCE). The vulnerability is actively exploited in the wild, and a proof-of-concept (PoC) exploit is publicly available. This vulnerability has been designated CVE-2025-6554 and is actively being exploited by threat actors, including nation-state actors. The vulnerability is also present in Chromium-based browsers such as Microsoft Edge and Opera.
**Recommendations:**
Update Google Chrome to version 138.0.7204.96 or later.
Update Chromium-based browsers to the latest available version.
Exploit
Fix
DoS
RCE
Type Confusion
Weakness Enumeration
Related Identifiers
Affected Products
References · 191
- 🔥 https://github.com/9Insomnie/CVE-2025-6554⭐ 1 🔗 1 · Exploit
- https://safe-surf.ru/specialists/bulletins-nkcki/722440 · Security Note
- https://security-tracker.debian.org/tracker/CVE-2025-6554 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-6554 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/722434 · Security Note
- https://osv.dev/vulnerability/DSA-5955-1 · Vendor Advisory
- https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html?m=1 · Security Note
- https://osv.dev/vulnerability/CVE-2025-6554 · Vendor Advisory
- https://safe-surf.ru/specialists/bulletins-nkcki/722694 · Security Note
- https://security-tracker.debian.org/tracker/source-package/chromium · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6554 · Security Note
- https://bdu.fstec.ru/vul/2025-07783 · Security Note
- https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html · Vendor Advisory
- https://security-tracker.debian.org/tracker/DSA-5955-1 · Vendor Advisory
- https://twitter.com/hosselot/status/1939848584746442992 · Twitter Post