PT-2025-47217 · Google +3 · V8 +4
Published
2025-11-17
·
Updated
2026-01-27
·
CVE-2025-13223
CVSS v2.0
10
10
High
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Chromium versions prior to 142.0.7444.175
Opera versions prior to Opera One (124.0.5705.42), Opera GX (124.0.5705.38), Opera Air (122.0.5643.196), Opera Neon (124.0.5705.44), and Opera for Android (92.6)
Microsoft Edge (Chromium-based) versions prior to 142.0.7444.175
Brave versions prior to 1.84.141
Description
A type confusion vulnerability exists in the V8 JavaScript and WebAssembly engine used in Chromium and its derivatives. This flaw allows a remote attacker to potentially exploit heap corruption via a crafted HTML page, potentially leading to arbitrary code execution. The vulnerability (CVE-2025-13223) is actively exploited in the wild. The issue stems from improper handling of V8 objects, providing a path for attackers to execute code through malicious web pages. This vulnerability affects a large number of users globally, as Chrome is the most used browser.
Recommendations
Update Chromium to version 142.0.7444.175 or later.
Update Opera to Opera One (124.0.5705.42), Opera GX (124.0.5705.38), Opera Air (122.0.5643.196), Opera Neon (124.0.5705.44), or Opera for Android (92.6) or later.
Update Microsoft Edge to version 142.0.7444.175 or later.
Update Brave to version 1.84.141 or later.
Fix
RCE
Type Confusion
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
ALT-PU-2025-15267
BDU:2025-14497
CVE-2025-13223
DSA-6060-1
Affected Products
Alt Linux
Debian
Google Chrome
Red Os
V8
References · 123
- https://bdu.fstec.ru/vul/2025-14497 · Security Note
- https://osv.dev/vulnerability/DEBIAN-CVE-2025-13223 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-13223 · Security Note
- https://wiki.astralinux.ru/astra-linux-se16-bulletin-20251225SE16 · Vendor Advisory
- https://wiki.astralinux.ru/astra-linux-se47-bulletin-2025-1216SE190 · Vendor Advisory
- https://security-tracker.debian.org/tracker/CVE-2025-13223 · Vendor Advisory
- http://repo.red-soft.ru/redos/7.3c/x86_64/updates · Vendor Advisory
- https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop_17.html · Vendor Advisory, Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13223 · Vendor Advisory
- https://wiki.astralinux.ru/astra-linux-se17-bulletin-2025-1202SE17 · Vendor Advisory
- https://twitter.com/AnonOzzyDude/status/1990701161465159945 · Twitter Post
- https://twitter.com/ambientwayfarer/status/1990971572677718045 · Twitter Post
- https://twitter.com/dailytechonx/status/1990802938319581641 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1p22kmo/cve202513223_the_chrome_vulnerability_you_cant · Reddit Post
- https://twitter.com/grok/status/1992155863986172168 · Twitter Post