Comprehensive Threat Exposure Management Platform
Google Chrome users face an urgent security threat from an actively exploited zero-day vulnerability affecting the V8 JavaScript engine. The critical vulnerability, tracked as CVE-2025-13223, enables remote attackers to execute arbitrary code on victims’ devices through maliciously crafted HTML pages. This type confusion vulnerability in Google Chrome’s V8 engine allows heap memory corruption without requiring user interaction, making it particularly dangerous for Chrome users across Windows, macOS, and Linux platforms.
The zero-day vulnerability was discovered in November 2025 and Google has confirmed active exploitation in the wild. Organizations and individual users must immediately update Google Chrome to version 142.0.7444.175/.176 to protect against this critical security threat. The vulnerability carries the highest risk level (Red) according to HivePro’s threat assessment, with an Admiralty Code of A1 indicating confirmed active exploitation.
The Google Chrome V8 engine vulnerability represents a severe type confusion bug that compromises browser security at the JavaScript execution level. This zero-day vulnerability affects all Google Chrome versions prior to 142.0.7444.175, exposing millions of users to potential remote code execution attacks. The V8 JavaScript engine vulnerability allows attackers to corrupt heap memory through specially crafted HTML pages, bypassing Chrome’s security mechanisms.
Type confusion vulnerabilities in the V8 engine occur when the JavaScript interpreter incorrectly handles object types, leading to memory corruption. The CVE-2025-13223 vulnerability specifically enables remote attackers to trigger heap corruption without any user interaction beyond visiting a compromised website. This zero-day exploit has been actively used in real-world attacks, significantly elevating the risk profile for unpatched Chrome installations.
Google’s security update also addresses CVE-2025-13224, another type confusion vulnerability in the V8 JavaScript engine. While this secondary vulnerability hasn’t been exploited in the wild, it poses similar risks to Chrome users if left unpatched. Both V8 engine vulnerabilities were patched in the same Chrome security update cycle, demonstrating the critical nature of JavaScript engine security in modern browsers.
Users must update Google Chrome immediately to protect against the actively exploited zero-day vulnerability CVE-2025-13223. The secure Chrome versions are:
Chrome users can verify and apply security updates by navigating to More > Help > About Google Chrome. The browser will automatically check for the latest version and prompt for a relaunch to complete the update process. This Chrome security update is critical for protecting against active zero-day exploitation.
Enable automatic updates in Google Chrome to ensure continuous protection against emerging vulnerabilities. The V8 engine vulnerability can be triggered through crafted HTML pages, making it essential to avoid clicking suspicious links or visiting untrusted websites until Chrome is updated. Organizations should implement vulnerability management processes that include regular software assessments, maintaining inventories of Chrome versions across their infrastructure, and evaluating third-party vendor security practices.
Browser security requires constant vigilance, particularly when zero-day vulnerabilities are actively exploited. Users should treat this Chrome update as critical infrastructure maintenance, given the widespread use of Chrome browsers in enterprise and personal computing environments.
The Chrome zero-day vulnerability exploitation follows several MITRE ATT&CK framework techniques:
The official Google Chrome release blog provides detailed information about the security update addressing CVE-2025-13223: https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop_17.html
This Chrome security advisory confirms the zero-day vulnerability’s active exploitation status and provides version-specific update guidance for all supported platforms. Security researchers and IT administrators should monitor Google’s Chrome releases for additional security updates addressing V8 engine vulnerabilities.
Get through updates and upcoming events, and more directly in your inbox