[CIVN-2025-0354] Multiple Vulnerabilities in Microsoft Edge

By Published On: December 8, 2025

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Microsoft Edge 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Microsoft Edge Stable Channel (Chromium-based) versions prior to 143.0.3650.66
Overview
Multiple vulnerabilities have been reported in Microsoft Edge (Chromium-based) which could allow a remote attacker to execute arbitrary code, bypass security restrictions, perform spoofing attacks, gain elevated privileges, cause denial of service condition or access to sensitive information on the targeted system.
Target Audience:
All end-user organizations and individuals using Microsoft Edge (Chromium-based).
Risk Assessment:
High risk of full system compromise, unauthorized access to sensitive data, malware deployment, authentication bypass, or system instability.
Impact Assessment:
Potential for arbitrary code execution, service disruption, privilege escalation, or sensitive data disclosure.
Description
Microsoft Edge (Chromium-based) is a web browser developed by Microsoft using the Chromium engine, offering fast performance, enhanced security, and compatibility with modern web standards while integrating with Microsoft services.
Multiple vulnerabilities exist in Microsoft Edge (Chromium-based) due to spoofing, inappropriate implementation issues in multiple components (such as Passwords, WebRTC, Downloads, Split View, DevTools, Google Updater); race conditions and type confusion in V8; use-after-free in Media Stream and Digital Credentials; and bad cast in Loader component. A remote attacker could exploit these vulnerabilities by persuading a victim to visit a specially crafted or malicious webpage.
Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, bypass security restrictions, perform spoofing attacks, gain elevated privileges, cause denial of service condition or access to sensitive information on the targeted system.
Solution
Apply the security updates released by Microsoft:
https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnotes-security#december-4-2025
Vendor Information
Microsoft
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13630
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13631
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13632
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13633
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13634
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13635
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13636
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13637
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13638
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13639
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13640
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13720
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13721
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62223
References
Microsoft
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13630
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13631
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13632
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13633
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13634
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13635
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13636
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13637
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13638
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13639
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13640
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13720
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13721
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62223
CVE Name
CVE-2025-13630
CVE-2025-13631
CVE-2025-13632
CVE-2025-13633
CVE-2025-13634
CVE-2025-13635
CVE-2025-13636
CVE-2025-13637
CVE-2025-13638
CVE-2025-13639
CVE-2025-13640
CVE-2025-13720
CVE-2025-13721
CVE-2025-62223
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmk20e8ACgkQ3jCgcSdc
ys+kOw//dvX2AXSby2dmReU5XaZiy7ElMJNvKetsFIe+95hNmygkzhaKTy/l7jkH
twKymhElvV78VAC1iMXEEUusOXMzeImASg3lR8AZd+yuUdG6GYGsmtuRYhAPogDR
iF+3jte/Atzpr2VfqX7ewqgw7FuTiYyfYbukE2wvZeDi4huSRp82JbO4L4vQuau7
xsUUiRgYMYm1gc0kbhuN3SjT+kNy15UcXm+nk9IbhSXAhaivRpx8F4ZbViXFXLhK
mvHs9bshglW52BicFFF5+4L2JziIqW4EtHhAmDHFRa15gkhZBD00wHRiVztBFIHX
drWDcYySRO9hFurnHsQeEhcS7CWGrHSvzlZDfSKbd18nfcGfsdg5Tsob+Il9Qj2l
6hgYu3uRlozjGzwatlHNwasb3Pfh/93tAvkRvVRXEO8VFf3CM2QDDfV48iH7lbzp
8DRRw+tOrd8JbjWOsBo0oHinucFd1hIHbWYgbShpJf49Gxt623VUEpjJP85YA5ZC
9pbJeTB22aPMe0UNITGrg8UtcbURqu75WKf2wxuxODMSSdwEZj3PB4qqTYP0hPGP
ReMEzCAsSFvTKxaBYLHGE+2YNDeiVwhFP/L2RS9TldbhJm6cZCImG2WRMkn2revx
82cMIC4wIU8Hg/36ffY52k2D2dA3BnJ9bePy7MvkbkTsB+X2S6Y=
=O6gU
—–END PGP SIGNATURE—–

Share this article