Google has issued emergency security updates for Chrome. These patch a high-severity vulnerability in the browser. Successful exploitation could lead to full account takeover. While active attacks are unconfirmed, Google warned an exploit exists. The company stated it is aware of this exploit. This was mentioned in a Wednesday security advisory. The flaw is tracked as CVE-2025-4664. It poses a significant risk to users.
Security researcher Vsevolod Kokorin discovered the vulnerability.
It is an insufficient policy enforcement issue. This flaw is in Chrome’s Loader component. It lets attackers leak cross-origin data. This happens via maliciously crafted HTML pages. Kokorin explained Chrome resolves Link headers on subresources. This header can set a referrer policy. Specifying “unsafe-url” captures full query parameters. These parameters can contain sensitive data. This might lead to account takeovers in OAuth flows.
Google fixed the flaw for users on the Stable Desktop channel. Patched versions are now rolling out worldwide. The versions are 136.0.7103.113 for Windows/Linux. For macOS, it is 136.0.7103.114. Updates were immediately available when checked by BleepingComputer. Chrome can also update automatically upon its next launch. In March, Google fixed another high-severity Chrome zero-day. That was CVE-2025-2783, used in espionage attacks.
Last year, Google patched 10 zero-day vulnerabilities.
On Wednesday, Google released updates for four security issues. CVE-2025-4664 was one with a public exploit. It is a high-severity flaw in Chrome’s Loader. This allows leaking cross-origin data via crafted HTML. It is unclear if it was exploited beyond a proof-of-concept. Users should update their Chrome browser immediately. Users of other Chromium-based browsers also need to update. These include Edge, Brave, Opera, and Vivaldi, when fixes arrive.
Reference: