By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw
Computing

Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw

News Room
Last updated: 2025/12/11 at 4:58 AM
News Room Published 11 December 2025
Share
Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw
SHARE

Dec 11, 2025Ravie LakshmananZero-Day / Vulnerability

Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one it said has come under active exploitation in the wild.

The vulnerability, rated high in severity, is being tracked under the Chromium issue tracker ID “466192044.” Unlike other disclosures, Google has opted to keep information about the CVE identifier, the affected component, and the nature of the flaw under wraps.

“Google is aware that an exploit for 466192044 exists in the wild,” the company noted, adding that more details are “under coordination.”

Naturally, the tech giant has also not disclosed any specifics on the identity of the threat actor behind the attacks, who may have been targeted, or the scale of such efforts.

This is typically done so as to ensure that a majority of the users have applied the fixes and to prevent other bad actors from reverse engineering the patch and developing their own exploits.

Cybersecurity

With the latest update, Google has addressed eight zero-day flaws in Chrome that have been either actively exploited or demonstrated as a proof-of-concept (PoC) since the start of the year. The list includes CVE-2025-2783, CVE-2025-4664, CVE-2025-5419, CVE-2025-6554, CVE-2025-6558, CVE-2025-10585, and CVE-2025-13223.

Also addressed by Google are two other medium-severity vulnerabilities –

  • CVE-2025-14372 – Use-after-free in Password Manager
  • CVE-2025-14373 – Inappropriate implementation in Toolbar

To safeguard against potential threats, it’s advised to update their Chrome browser to versions 143.0.7499.109/.110 for Windows and Apple macOS, and 143.0.7499.109 for Linux. To make sure the latest updates are installed, users can navigate to More > Help > About Google Chrome and select Relaunch.

Users of other Chromium-based browsers, such as Microsoft Edge, Brave, Opera, and Vivaldi, are also advised to apply the fixes as and when they become available.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article After Months of Testing Smart Rings, This Is the Only One I Think You Should Buy After Months of Testing Smart Rings, This Is the Only One I Think You Should Buy
Next Article Marshall Bromley 750 Marshall Bromley 750
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

‘The Bride!’ review: this feminist creature feature proves that all monsters aren’t created equal
‘The Bride!’ review: this feminist creature feature proves that all monsters aren’t created equal
News
Google Photos can finally remember how much you don’t want to use Ask Photos
Google Photos can finally remember how much you don’t want to use Ask Photos
News
I Automated 80% of My Code Review With 5 Shell Scripts | HackerNoon
I Automated 80% of My Code Review With 5 Shell Scripts | HackerNoon
Computing
Today's NYT Connections: Sports Edition Hints, Answers for March 10 #533
Today's NYT Connections: Sports Edition Hints, Answers for March 10 #533
News

You Might also Like

I Automated 80% of My Code Review With 5 Shell Scripts | HackerNoon
Computing

I Automated 80% of My Code Review With 5 Shell Scripts | HackerNoon

17 Min Read
Alibaba challenges Meituan with Amap Street Stars · TechNode
Computing

Alibaba challenges Meituan with Amap Street Stars · TechNode

1 Min Read
FalconAI Earns a 36 Proof of Usefulness Score by Building an AI-Native IPTV Platform | HackerNoon
Computing

FalconAI Earns a 36 Proof of Usefulness Score by Building an AI-Native IPTV Platform | HackerNoon

1 Min Read
Tesla’s China supercharger network exceeds 2,500 stations as company launches hiring push · TechNode
Computing

Tesla’s China supercharger network exceeds 2,500 stations as company launches hiring push · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?