Use after free in Extensions in Google Chrome prior to 139.0.7258.66 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Medium)
Metrics
Affected Vendors & Products
References
History
Fri, 08 Aug 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apple
Apple macos Linux Linux linux Kernel Microsoft Microsoft windows |
|
CPEs | cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Apple
Apple macos Linux Linux linux Kernel Microsoft Microsoft windows |
Thu, 07 Aug 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Thu, 07 Aug 2025 07:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Google
Google chrome |
|
Vendors & Products |
Google
Google chrome |
Thu, 07 Aug 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Use after free in Extensions in Google Chrome prior to 139.0.7258.66 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Medium) | |
Weaknesses | CWE-416 | |
References |
|

Status: PUBLISHED
Assigner: Chrome
Published: 2025-08-07T01:30:38.461Z
Updated: 2025-08-07T13:40:36.978Z
Reserved: 2025-08-05T02:46:27.527Z
Link: CVE-2025-8576

Updated: 2025-08-07T13:40:06.981Z

Status : Analyzed
Published: 2025-08-07T02:15:27.050
Modified: 2025-08-08T18:22:51.520
Link: CVE-2025-8576

No data.