CVE-2025-2783
HIGHCVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Lifecycle Timeline
5Description
Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)
Analysis
Google Chrome on Windows contains a Mojo IPC handle validation flaw enabling sandbox escape through a malicious file, exploited in targeted attacks against Russian organizations in March 2025.
Technical Context
The vulnerability in Mojo's handle validation on Windows provides an incorrect handle that enables sandbox escape. When a user interacts with a malicious file, the flaw allows the attacker to execute code outside Chrome's sandbox with the user's full privileges.
Affected Products
['Google Chrome on Windows prior to 134.0.6998.177']
Remediation
Update Chrome immediately. This vulnerability specifically affects Windows. Enable Chrome's enhanced protection mode.
Priority Score
Vendor Status
Share
External POC / Exploit Code
Leaving vuln.today