- Description
- Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
- Source
- chrome-cve-admin@google.com
- NVD status
- Analyzed
- Products
- chrome
CVSS 3.1
- Type
- Secondary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
- chrome-cve-admin@google.com
- CWE-416
- Hype score
- Not currently trending
Attention #CyberSecurity students! 🎓 If you're studying memory corruption, the new Chrome Zero-Days (CVE-2025-14765 & 14766). Analyze the breakdown here: https://t.co/IYco70tqAM #InfoSec #StudentLife #BugBounty #TechEducation #GoogleAlerts #CyberSecurity
@ZyberWallS
30 Dec 2025
2 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
Google just patched two critical holes in your browser's armor (CVE-2025-14765 & 14766). Kindly Update Chrome. I’ve broken down the technical mess into simple analogies. Is your wall secure? 🛡️ Read here: https://t.co/IYco70tqAM #CyberSecurity #ChromeUpdate #Zyberw
@ZyberWallS
30 Dec 2025
6 Impressions
2 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
#Debian Security Advisory DSA-6089-1: Patch Chromium NOW. Critical RCE vulnerabilities (CVE-2025-14765/14766) patched in versions 143.0.7499.169-1~deb12u1 (Bookworm) and ~deb13u1 (Trixie). Read more: 👉 https://t.co/KKPaZbot07 #Security https://t.co/3FVXg6ASxP
@Cezar_H_Linux
21 Dec 2025
74 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Critical security update for #Chromium on #Fedora 42. The just-released version 143.0.7499.146 closes two dangerous memory corruption holes (CVE-2025-14765 / CVE-2025-14766) that could lead to heap corruption and remote compromise. Read more: 👉 https://t.co/lwsg9umAEP #Securi
@Cezar_H_Linux
20 Dec 2025
32 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Technical deep dive: The new #Fedora 43 Chromium advisory (143.0.7499.146) addresses critical memory safety failures. CVE-2025-14765 (WebGPU UAF) and CVE-2025-14766 (V8 OOB) are classic pathways to heap corruption and RCE. Read more: 👉 https://t.co/bcAbBgHiqB #Security https:/
@Cezar_H_Linux
20 Dec 2025
72 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Chromium affected by Use-after-free vulnerability (CVE-2025-14765) in WebGPU. Allows heap corruption via crafted HTML. Monitor for patch releases and update promptly. https://t.co/UAo37y6g3o
@pulsepatchio
18 Dec 2025
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Google、デスクトップ版 Chromeを緊急更新 WebGPUとV8の高危険度脆弱性を修正(CVE-2025-14765,CVE-2025-14766) https://t.co/W2lp7GvovR #セキュリティ対策Lab #セキュリティ #Security #サイバー攻撃
@securityLab_jp
18 Dec 2025
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Chrome Security Update Google released Chrome v143.0.7499.146/.147 fixing critical RCE flaws: • CVE-2025-14765 – Use-after-free in WebGPU • CVE-2025-14766 – OOB read/write in V8 Rolling out now for All OS. Update ASAP. 🔒 #CyberSecurity #Vulnerabilities #Chrome
@sp20_10
17 Dec 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🟠 CVE-2025-14765 - High Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) https://t.co/vpasZc4JXo https://t.co/wsz2vD36Cs
@TheHackerWire
17 Dec 2025
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
【今日のChrome】今日も緊急更新。 WebGPUにおける解放後メモリ使用CVE-2025-14765とV8におけるメモリ破壊CVE-2025-14766。 https://t.co/Je1OXzrlx6
@__kokumoto
17 Dec 2025
998 Impressions
2 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4CC700EA-0A87-4454-B4B2-1695356405B4",
"versionEndExcluding": "143.0.7499.146"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]