CVE-2025-6192Use After Free in Google Chrome

CWE-416Use After Free10 documents9 sources
Severity
8.8HIGHNVD
EPSS
0.2%
top 55.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 18
Latest updateJul 14

Description

Use after free in Metrics in Google Chrome prior to 137.0.7151.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages4 packages

CVEListV5google/chrome137.0.7151.119137.0.7151.119
NVDgoogle/chrome< 137.0.7151.119
Debianchromium/chromium< 137.0.7151.119-1~deb12u1+2

🔴Vulnerability Details

3
CVEList
CVE-2025-6192: Use after free in Metrics in Google Chrome prior to 1372025-06-18
GHSA
GHSA-7rwh-q57w-mhc9: Use after free in Metrics in Google Chrome prior to 1372025-06-18
OSV
CVE-2025-6192: Use after free in Metrics in Google Chrome prior to 1372025-06-18

📋Vendor Advisories

5
Chrome
Long Term Support Channel Update for ChromeOS: CVE-2025-61922025-07-14
Palo Alto
PAN-SA-2025-0013 Chromium: Monthly Vulnerability Update (July 2025)2025-07-09
Chrome
Stable Channel Update for Desktop: CVE-2025-61912025-06-17
Microsoft
Chromium: CVE-2025-6192 Use after free in Profiler2025-06-10
Debian
CVE-2025-6192: chromium - Use after free in Metrics in Google Chrome prior to 137.0.7151.119 allowed a rem...2025

🕵️Threat Intelligence

1
Bleepingcomputer
Grafana releases critical security update for Image Renderer plugin2025-07-03
CVE-2025-6192 — Use After Free in Google Chrome | cvebase