Google has released critical security updates addressing its sixth zero-day vulnerability of 2025, tracked as CVE-2025-10585. This type confusion flaw affects the V8 JavaScript and WebAssembly engine in Google Chrome and all Chromium-based browsers. Actively exploited in the wild, this vulnerability could allow attackers to crash systems or execute arbitrary code on Windows, macOS, and Linux. Immediate patching is strongly advised to mitigate risk.
CVE-2025-10585 is a type confusion vulnerability in Chrome’s V8 JavaScript engine. Successful exploitation allows attackers to cause unexpected software behavior, memory corruption, system crashes, and remote code execution.
This is Chrome’s sixth actively exploited zero-day in 2025, following CVE-2025-2783, CVE-2025-4664, CVE-2025-5419, CVE-2025-6554, and CVE-2025-6558. The fix is included in Chrome version 140.0.7339.185/.186 for Windows and macOS, and 140.0.7339.185 for Linux. The same patch also resolves three additional high-severity vulnerabilities, including use-after-free flaws in Dawn and WebRTC and a heap buffer overflow in ANGLE.
chrome://flags/#enable-site-per-process
) to reduce memory sharing between sites, mitigating the impact of memory corruption attacks.Get through updates and upcoming events, and more directly in your inbox