top of page

High-Severity Chrome Vulnerability (CVE-2025-9132) Allows Remote Code Execution via V8 Engine

August 21st, 2025

High

Our Cyber Threat Intelligence Unit has identified a high-severity vulnerability (CVE-2025-9132) in the V8 JavaScript engine, which is used by Google Chrome and other Chromium-based browsers, including Microsoft Edge, Brave, and Opera. The vulnerability stems from an out-of-bounds write issue that can cause memory corruption. Successful exploitation could lead to browser crashes or allow arbitrary code execution. Google has addressed the vulnerability in the Stable Channel Update for Chrome versions 139.0.7258.138 and 139.0.7258.139, advising all users to update immediately.

Technical Details

  • Attack Type: Remote Code Execution (via memory corruption)

  • Severity: High (CVSS Score: 8.1)

  • CVE ID: CVE-2025-9132

  • Delivery Method: Maliciously crafted web content processed by Chrome’s V8 JavaScript engine

  • Technique: Out-of-Bounds Write in the V8 JavaScript engine, leading to memory corruption and potential code execution.

  • Affected Products: Versions of Chrome prior to 139.0.7258.138/.139

Image by ThisisEngineering

Impact

  • Successful exploitation may allow attackers to access sensitive data by exploiting code injection or memory-related bugs.

  • Improper control of code generation could lead to unauthorized modifications of data, resulting in data corruption.

  • Exploitation of these vulnerabilities could lead to denial-of-service conditions, affecting system availability.

  • Memory-related vulnerabilities in the V8 engine could cause crashes or instability in applications using Chromium-based browsers.

  • Exploitation of these vulnerabilities may require systems to be taken offline for patching and recovery, disrupting business operations.

  • Failure to address these vulnerabilities promptly could result in non-compliance with data protection regulations, such as GDPR or CCPA, especially if data breaches occur.

Detection Method

  • Check Chrome installations: versions earlier than 139.0.7258.138/.139 are vulnerable.

  • Look for unexpected browser crashes or anomalies during JavaScript execution.

  • Review browser crash logs or system logs for memory violation errors.

  • Detect malicious or suspicious web content attempting to exploit browser rendering engines.

Indicators of Compromise

There are no indicators of Compromise (IOCs) for this Advisory.

mix of red, purple, orange, blue bubble shape waves horizontal for cybersecurity and netwo

Recommendations

  • Update Google Chrome to the latest version (139.0.7258.138/.139) immediately.

  • Ensure Microsoft Edge, Brave, Opera, and other Chromium-based browsers are updated once vendor patches are released.

  • Implement centralized patch monitoring to verify all browsers are up to date.

  • Instruct end users to restart browsers after updating to complete the patch application.

  • Track vendor advisories for new exploit activity or follow-on updates.

Conclusion

CVE-2025-9132 highlights the severe risks posed by memory corruption vulnerabilities in browser engines.  Although there is currently no evidence of active exploitation in the wild, V8 vulnerabilities have historically been targeted by advanced threat actors for zero-day attacks. We urge organizations to patch Chrome to version 139.0.7258.138/.139, update Chromium-based browsers, and remain vigilant through ongoing monitoring and patch management.

bottom of page