The security risks of browser extensions in enterprise environments are becoming a growing concern, according to the Enterprise Browser Extension Security Report 2025. Nearly all employees use browser extensions, with over half having more than ten extensions installed. However, many of these extensions have risky permissions, which pose a significant risk to organizational data. The report shows that 53% of extensions can access sensitive data like passwords, cookies, and browsing information, making enterprise networks vulnerable to potential breaches.
One of the most alarming findings is the lack of accountability for extension publishers. Over 50% of publishers are anonymous and often identified only by their Gmail accounts. Furthermore, 79% of them have published only one extension, making it difficult for organizations to track their reliability. GenAI extensions, in particular, pose an escalating threat, with 20% of users installing them, many with high-risk permission scopes that could lead to data exposure or compromise.
The report also highlights that many extensions are outdated or unmaintained, with 51% not receiving updates for over a year.
In addition, 26% of enterprise extensions are sideloaded, bypassing the typical vetting process that occurs in official stores. This raises concerns about vulnerabilities that can exist in extensions even without malicious intent, exposing organizations to security risks.
These factors make it clear that organizations need to reassess their policies and manage browser extension risks more effectively.
To mitigate these threats, LayerX provides recommendations for security teams, emphasizing the need for a thorough audit of all extensions. Categorizing extensions based on their risk and permissions helps security teams understand potential threats. A risk-based enforcement policy should then be applied to monitor and control extension use across the organization. This proactive approach is crucial in reducing the risks associated with browser extensions and securing enterprise data against evolving cybersecurity threats.
Reference: