Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Encrypthub targets Web3 developers using fake AI platforms to deploy Fickle Stealer malware

Tesla loses its appeal to Indian loyalists – even if the masks finally deliver

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New Chrome vulnerability enables cross-origin data leaks via loader referrer policy
Identity

New Chrome vulnerability enables cross-origin data leaks via loader referrer policy

userBy userMay 15, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 15, 2025Ravi LakshmananBrowser Security / Web Security

New Chrome Vulnerabilities

On Wednesday, Google released an update to address four security issues in the Chrome web browser.

High-strength vulnerabilities tracked as CVE-2025-4664 (CVSS score: 4.3) are characterized as inadequate policy enforcement in a component called loaders.

“Policy enforcement in Google Chrome loaders prior to 136.0.7103.113 allowed remote attackers to leak cross-origin data via created HTML pages,” according to the flaw description.

The Tech giant detailed the defects in X on May 5, 2025 to security researcher Vsevolod Kokorin (@slonser_), adding that “the CVE-2025-4664 exploit exists in the wild.”

Cybersecurity

“Unlike other browsers, Chrome resolves link headers for subresource requests,” Kokorin said in a series of posts about X earlier this month. “The problem is that the link header can set the referrer politics. You can specify an insecure URL and capture the full query parameters.”

The researchers added that the query parameters may contain sensitive data that could lead to a full acquisition of the account, allowing query parameter information to be stolen via images from third-party resources.

It is not clear whether the vulnerability was exploited in a malicious context other than this proof of concept (POC) demonstration. CVE-2025-4664 is the second vulnerability after CVE-2025-2783 undergoes “active exploitation” in the wild.

To protect against potential threats, we recommend updating your Chrome browser to version 136.0.7103.113/.114 for Windows and Mac and 136.0.7103.113 for Linux. It is also recommended that users of other Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi also apply the fix when it becomes available.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHarvard thought there would be a cheap copy of Magna Carta. It turns out to be extremely rare
Next Article Russia-Ukraine War: List of Major Events, Day 1,176 | News of the Russian-Ukraine War
user
  • Website

Related Posts

Encrypthub targets Web3 developers using fake AI platforms to deploy Fickle Stealer malware

July 20, 2025

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

July 20, 2025

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

July 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Encrypthub targets Web3 developers using fake AI platforms to deploy Fickle Stealer malware

Tesla loses its appeal to Indian loyalists – even if the masks finally deliver

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.