CVE-2025-8576Use After Free in Google Chrome

CWE-416Use After Free8 documents8 sources
Severity
8.8HIGHNVD
EPSS
0.2%
top 56.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 7
Latest updateOct 10

Description

Use after free in Extensions in Google Chrome prior to 139.0.7258.66 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Medium)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages4 packages

CVEListV5google/chrome139.0.7258.66139.0.7258.66
NVDgoogle/chrome< 139.0.7258.66
Debianchromium/chromium< 139.0.7258.66-1~deb12u1+2

🔴Vulnerability Details

3
CVEList
CVE-2025-8576: Use after free in Extensions in Google Chrome prior to 1392025-08-07
OSV
CVE-2025-8576: Use after free in Extensions in Google Chrome prior to 1392025-08-07
GHSA
GHSA-8vwm-wmwm-x9cm: Use after free in Extensions in Google Chrome prior to 1392025-08-07

📋Vendor Advisories

4
Chrome
Long Term Support Channel Update for ChromeOS: CVE-2025-85762025-10-10
Palo Alto
PAN-SA-2025-0015 Chromium: Monthly Vulnerability Update (September 2025)2025-09-10
Microsoft
Chromium: CVE-2025-8576 Use after free in Extensions2025-08-12
Debian
CVE-2025-8576: chromium - Use after free in Extensions in Google Chrome prior to 139.0.7258.66 allowed a r...2025
CVE-2025-8576 — Use After Free in Google Chrome | cvebase