By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw
Computing

Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw

News Room
Last updated: 2025/12/11 at 4:58 AM
News Room Published 11 December 2025
Share
Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw
SHARE

Dec 11, 2025Ravie LakshmananZero-Day / Vulnerability

Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one it said has come under active exploitation in the wild.

The vulnerability, rated high in severity, is being tracked under the Chromium issue tracker ID “466192044.” Unlike other disclosures, Google has opted to keep information about the CVE identifier, the affected component, and the nature of the flaw under wraps.

“Google is aware that an exploit for 466192044 exists in the wild,” the company noted, adding that more details are “under coordination.”

Naturally, the tech giant has also not disclosed any specifics on the identity of the threat actor behind the attacks, who may have been targeted, or the scale of such efforts.

This is typically done so as to ensure that a majority of the users have applied the fixes and to prevent other bad actors from reverse engineering the patch and developing their own exploits.

Cybersecurity

With the latest update, Google has addressed eight zero-day flaws in Chrome that have been either actively exploited or demonstrated as a proof-of-concept (PoC) since the start of the year. The list includes CVE-2025-2783, CVE-2025-4664, CVE-2025-5419, CVE-2025-6554, CVE-2025-6558, CVE-2025-10585, and CVE-2025-13223.

Also addressed by Google are two other medium-severity vulnerabilities –

  • CVE-2025-14372 – Use-after-free in Password Manager
  • CVE-2025-14373 – Inappropriate implementation in Toolbar

To safeguard against potential threats, it’s advised to update their Chrome browser to versions 143.0.7499.109/.110 for Windows and Apple macOS, and 143.0.7499.109 for Linux. To make sure the latest updates are installed, users can navigate to More > Help > About Google Chrome and select Relaunch.

Users of other Chromium-based browsers, such as Microsoft Edge, Brave, Opera, and Vivaldi, are also advised to apply the fixes as and when they become available.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article After Months of Testing Smart Rings, This Is the Only One I Think You Should Buy After Months of Testing Smart Rings, This Is the Only One I Think You Should Buy
Next Article Marshall Bromley 750 Marshall Bromley 750
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Adam M. Root: How to Architect Agentic AI Workflows That Scale Across the Enterprise | HackerNoon
Adam M. Root: How to Architect Agentic AI Workflows That Scale Across the Enterprise | HackerNoon
Computing
Learnings from Cultivating Machine Learning Engineers as a Team Manager
Learnings from Cultivating Machine Learning Engineers as a Team Manager
News
When a Motorcycle Accident Affects Your Life and Travel Plans
When a Motorcycle Accident Affects Your Life and Travel Plans
Gadget
Universities must promote AI augmentation, not automation
Universities must promote AI augmentation, not automation
Software

You Might also Like

Adam M. Root: How to Architect Agentic AI Workflows That Scale Across the Enterprise | HackerNoon
Computing

Adam M. Root: How to Architect Agentic AI Workflows That Scale Across the Enterprise | HackerNoon

0 Min Read
WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor
Computing

WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor

5 Min Read
Microsoft Is Back To Working On “Hornet” Security For eBPF Programs On Linux
Computing

Microsoft Is Back To Working On “Hornet” Security For eBPF Programs On Linux

3 Min Read
DM Changes Merged For Linux 6.19 – Much Better Performance For “Verity” Integrity
Computing

DM Changes Merged For Linux 6.19 – Much Better Performance For “Verity” Integrity

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?