⚠ Actively exploited
Added to CISA KEV on 2025-03-27. Federal agencies required to patch by 2025-04-17. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable..
CVE-2025-2783 — Resource Exposure in Google Chrome
Severity
10.0CRITICALNVD
NVD8.3CNA8.3GHSA8.3OSV8.3VulnCheck8.3CISA8.3
EPSS
39.5%
top 2.69%
CISA KEV
KEV
Added 2025-03-27
Due 2025-04-17
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMar 26
KEV addedMar 27
KEV dueApr 17
Latest updateMar 5
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Description
Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:HExploitability: 1.6 | Impact: 6.0
Affected Packages5 packages
🔴Vulnerability Details
8GHSA▶
CefSharp affected by incorrect handle provided in unspecified circumstances in Mojo on Windows↗2025-04-12
OSV▶
CefSharp affected by incorrect handle provided in unspecified circumstances in Mojo on Windows↗2025-04-12
GHSA▶
GHSA-h8g5-2596-xjh9: Following the sandbox escape in CVE-2025-2783, various Firefox developers identified a similar pattern in our IPC code↗2025-03-27
GHSA▶
GHSA-hfqm-jfc6-rh2f: Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134↗2025-03-26
💥Exploits & PoCs
1📋Vendor Advisories
10Palo Alto
▶
🕵️Threat Intelligence
20Securelist▶
Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports↗2025-12-17