CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Tags
Description
Type Confusion in V8 in Google Chrome prior to 137.0.7151.103 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Analysis
Type confusion vulnerability in Google Chrome's V8 JavaScript engine that enables remote code execution within the Chrome sandbox prior to version 137.0.7151.103. An attacker can exploit this via a crafted HTML page by tricking a user into visiting a malicious website, achieving arbitrary code execution with high severity impact (CVSS 8.8). The vulnerability's network-based attack vector, low complexity, and requirement only for user interaction make it a practical exploitation target.
Technical Context
This vulnerability exists in V8, Google Chrome's JavaScript engine, and is classified as a type confusion vulnerability (CWE-843). Type confusion occurs when the JavaScript engine incorrectly identifies or handles the type of an object or value, allowing attackers to bypass type safety mechanisms. The root cause is a flaw in V8's type system handling that fails to properly validate type information during object manipulation or function calls. CPE affected: cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* (versions prior to 137.0.7151.103). This affects the core V8 JIT compiler or interpreter responsible for JavaScript execution, potentially in object property access, array element handling, or function call dispatch mechanisms.
Affected Products
Chrome (< 137.0.7151.103); Chromium (Open-source versions prior to security release aligning with Chrome 137.0.7151.103)
Remediation
- primary_action: Update Google Chrome to version 137.0.7151.103 or later; method: Automatic updates (Chrome automatically downloads and installs security updates on restart) or manual update via Menu > Help > About Google Chrome - primary_action: Update Chromium-based browsers; method: Update Edge, Brave, Opera, and other Chromium-based browsers to their latest versions released after Chrome 137.0.7151.103 - temporary_mitigation: Avoid visiting untrusted websites until patched; disable JavaScript for untrusted content (limits usability; not recommended as primary mitigation) - temporary_mitigation: Monitor browser update status and force restart after updates to ensure patch application - reference: Google Chrome Release Notes (https://chromereleases.googleblog.com/) for v137.0.7151.103 and later security updates
Priority Score
Vendor Status
Debian
| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| bullseye (security), bullseye | vulnerable | 120.0.6099.224-1~deb11u1 | - |
| bookworm | fixed | 137.0.7151.103-1~deb12u1 | - |
| bookworm (security) | fixed | 146.0.7680.71-1~deb12u1 | - |
| trixie | fixed | 145.0.7632.159-1~deb13u1 | - |
| trixie (security) | fixed | 146.0.7680.71-1~deb13u1 | - |
| forky | fixed | 146.0.7680.71-1 | - |
| sid | fixed | 146.0.7680.80-1 | - |
| bullseye | fixed | (unfixed) | end-of-life |
| (unstable) | fixed | 137.0.7151.103-1 | - |
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18071