[CIVN-2025-0355] Multiple vulnerabilities in Google Chrome for Desktop

By Published On: December 8, 2025

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple vulnerabilities in Google Chrome for Desktop 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Google Chrome versions prior to 143.0.7499.40/41 for Windows
Google Chrome versions prior to 143.0.7499.40/41 for Mac
Google Chrome versions prior to 143.0.7499.40 for Linux
Overview
Multiple vulnerabilities have been reported in Google Chrome for Desktop, which could be exploited by a remote attacker to execute arbitrary code, obtain sensitive information, gain elevated privileges, spoofing and bypass security restriction on the targeted system.
Target Audience:
All end-user organizations and individuals using Google Chrome for Desktop.
Risk Assessment:
High risk of remote code execution, privilege escalation or unauthorized access to sensitive data.
Impact Assessment:
Potential for system compromise, data theft or service disruption.
Description
Google Chrome is a popular internet browser that is used for accessing the information available on the World Wide Web. It is designed for use on desktop computers, such as those running on Windows, macOS, or Linux operating systems.
Multiple vulnerabilities exist in Google Chrome due to Type Confusion and Race in V8; Inappropriate implementation in Google Updater, DevTools, Downloads, Split View, WebRTC, Password; Use after free in Digital Credentials, Media Stream; Bad cast in Loader. A remote attacker could exploit these vulnerabilities by persuading the victim to visit a specially crafted web page.
Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, obtain sensitive information, gain elevated privileges, spoofing and bypass security restriction on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop.html
Vendor Information
Google
https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop.html
References
Google
https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop.html
CVE Name
CVE-2025-13630
CVE-2025-13631
CVE-2025-13632
CVE-2025-13633
CVE-2025-13634
CVE-2025-13720
CVE-2025-13721
CVE-2025-13635
CVE-2025-13636
CVE-2025-13637
CVE-2025-13638
CVE-2025-13639
CVE-2025-13640
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=Zw/9
—–END PGP SIGNATURE—–

Share this article