Vulnerabilities

Chrome 143 Released With Patch For 13 Vulnerabilities Allowing Arbitrary Code Execution

Google has rolled out Chrome 143 to the stable channel for Windows, Mac, and Linux, addressing 13 security vulnerabilities in versions 143.0.7499.40 (Linux) and 143.0.7499.40/41 (Windows/Mac).

The update, announced on December 2, 2025, via the Chrome Releases blog, deploys gradually over days or weeks. Change logs appear in the Chromium repository.

This release prioritizes security, patching flaws that could enable arbitrary code execution, data leaks, or crashes.

High-severity issues dominate, including a V8 type confusion bug that can be exploited for remote attacks.

Internal tools like AddressSanitizer and libFuzzer detected many fixes pre-stable. External researchers earned bounties totaling over $15,000.

Vulnerabilities Patched

The update fixes 13 issues, detailed below. Access to complete bug reports remains restricted until most users update, per Chromium policy.

CVE IDSeverityComponentDescriptionReporterBounty
CVE-2025-13630HighV8Type confusionShreyas Penkar$11,000
CVE-2025-13631HighGoogle UpdaterInappropriate implementationJota Domingos$3,000
CVE-2025-13632HighDevToolsInappropriate implementationLeandro TelesTBD
CVE-2025-13633HighDigital CredentialsUse after freeChromeN/A
CVE-2025-13634MediumDownloadsInappropriate implementationEric Lawrence (MS)N/A
CVE-2025-13720MediumLoaderBad castChromeN/A
CVE-2025-13721MediumV8Race conditionChromeN/A
CVE-2025-13635LowDownloadsInappropriate implementationHafiizh$3,000
CVE-2025-13636LowSplit ViewInappropriate implementationKhalil Zhani$1,000
CVE-2025-13637LowDownloadsInappropriate implementationHafiizhTBD
CVE-2025-13638LowMedia StreamUse after freesherkitoTBD
CVE-2025-13639LowWebRTCInappropriate implementationPhilipp HanckeTBD
CVE-2025-13640LowPasswordsInappropriate implementationAnonymousTBD

Technical Impact and Recommendations

Standout flaws include CVE-2025-13630, a V8 type confusion vulnerability that allows memory corruption, potentially leading to sandbox escape and arbitrary code execution via heap spraying.

V8 races (CVE-2025-13721) and use-after-free errors (CVE-2025-13633, -13638) pose similar risks for exploits in rendering pipelines.

DevTools and Updater bugs (CVE-2025-13632, -13631) expose debugging tools and auto-updates to injection.

Downloads saw repeated fixes for path-traversal and UI-spoofing vulnerabilities. WebRTC and password issues could leak media streams or credentials.

Update immediately via Chrome’s built-in tool (chrome://settings/help) to mitigate zero-day risks. Chromium credits researchers and fuzzers for proactive defense.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies..

Share
Published by
Varshini

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago