CVE-2025-13630

| EUVD-2025-200309 HIGH
2025-12-02 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 15, 2026 - 14:04 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 14:04 euvd
EUVD-2025-200309
CVE Published
Dec 02, 2025 - 19:15 nvd
HIGH 8.8

Description

Type Confusion in V8 in Google Chrome prior to 143.0.7499.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Analysis

Type Confusion in V8 in Google Chrome prior to 143.0.7499.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Technical Context

This vulnerability is classified as Access of Resource Using Incompatible Type (Type Confusion) (CWE-843).

Affected Products

Affected products: Google Chrome

Remediation

Monitor vendor advisories for patches. Apply mitigations such as network segmentation, access restrictions, and monitoring.

Priority Score

44
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +44
POC: 0

Vendor Status

Ubuntu

Priority: Medium
chromium-browser
Release Status Version
jammy not-affected code not present
noble not-affected code not present
plucky not-affected code not present
questing not-affected code not present
upstream released -

Debian

chromium
Release Status Fixed Version Urgency
bullseye (security), bullseye vulnerable 120.0.6099.224-1~deb11u1 -
bookworm fixed 143.0.7499.40-1~deb12u1 -
bookworm (security) fixed 146.0.7680.71-1~deb12u1 -
trixie fixed 143.0.7499.40-1~deb13u1 -
trixie (security) fixed 146.0.7680.71-1~deb13u1 -
forky fixed 146.0.7680.71-1 -
sid fixed 146.0.7680.80-1 -
bullseye fixed (unfixed) end-of-life
(unstable) fixed 143.0.7499.40-1 -

Share

CVE-2025-13630 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy