PT-2025-47217 · Google +2 · Google Chrome +3
Published
2025-11-17
·
Updated
2025-12-07
·
CVE-2025-13223
CVSS v2.0
10
10
High
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Google Chrome versions prior to 142.0.7444.175
Chromium versions prior to 142.0.7444.175
Opera versions prior to 124.0.5705.42
Opera GX versions prior to 124.0.5705.38
Opera Air versions prior to 122.0.5643.196
Opera Neon versions prior to 124.0.5705.44
Opera for Android versions prior to 92.6
Microsoft Edge (Chromium-based) versions prior to 142.0.7444.175
Description
A type confusion vulnerability exists in the V8 JavaScript and WebAssembly engine, specifically in Google Chrome and Chromium-based browsers. This flaw, tracked as CVE-2025-13223, allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. Exploitation of this vulnerability could lead to arbitrary code execution. This issue is actively being exploited in the wild, and an exploit is known to exist. The vulnerability stems from improper V8 object handling, giving attackers a path to remote code execution through malicious web pages. There have been reports of this vulnerability being used in targeted spyware campaigns.
Recommendations
Update Google Chrome to version 142.0.7444.175 or later.
Update Chromium-based browsers to version 142.0.7444.175 or later.
Update Opera to version 124.0.5705.42 or later.
Update Opera GX to version 124.0.5705.38 or later.
Update Opera Air to version 122.0.5643.196 or later.
Update Opera Neon to version 124.0.5705.44 or later.
Update Opera for Android to version 92.6 or later.
Update Microsoft Edge to version 142.0.7444.175 or later.
Fix
RCE
Type Confusion
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
ALT-PU-2025-15267
BDU:2025-14497
CVE-2025-13223
DSA-6060-1
Affected Products
Alt Linux
Debian
Google Chrome
V8
References · 122
- https://security-tracker.debian.org/tracker/DSA-6060-1 · Vendor Advisory
- https://security-tracker.debian.org/tracker/CVE-2025-13223 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13224 · Security Note
- https://bdu.fstec.ru/vul/2025-14498 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13223 · Vendor Advisory
- https://errata.altlinux.org/ALT-PU-2025-15267 · Vendor Advisory
- https://osv.dev/vulnerability/DEBIAN-CVE-2025-13223 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-14497 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-13223 · Security Note
- https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop_17.html · Security Note, Vendor Advisory
- https://security-tracker.debian.org/tracker/source-package/chromium · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13223 · Security Note
- https://twitter.com/H4ckmanac/status/1990667488208801989 · Twitter Post
- https://twitter.com/Neon_corp/status/1990620790778147170 · Twitter Post
- https://twitter.com/VulmonFeeds/status/1990636425176297695 · Twitter Post