
Google shipped a security update for its Chrome browser on Wednesday that addressed three security flaws, including one it announced was being exploited in the wild.
This vulnerability is rated as High Severity and is tracked under Chromium issue tracking ID 466192044. Unlike other disclosures, Google has chosen to keep information about the CVE identifier, affected components, and nature of the flaw private.
“Google is aware that an exploit for 466192044 exists in the wild,” the company said, adding that it was “working out” details.
Unsurprisingly, the tech giant has not revealed any details about the identity of the attackers behind the attack, those who may have been targeted, or the scale of such an effort.
This is typically done to ensure that the majority of users have applied the fix and to prevent other bad actors from reverse engineering the patch and developing their own exploits.

In its latest update, Google addressed eight zero-day flaws in Chrome that have been actively exploited or demonstrated as proofs of concept (PoC) since the beginning of this year. The list includes CVE-2025-2783, CVE-2025-4664, CVE-2025-5419, CVE-2025-6554, CVE-2025-6558, CVE-2025-10585, and CVE-2025-13223.
Google is also addressing two other medium-severity vulnerabilities.
CVE-2025-14372 – Use after free in password manager CVE-2025-14373 – Improper implementation in toolbar
To protect against potential threats, we recommend updating your Chrome browser to version 143.0.7499.109/.110 for Windows and Apple macOS and 143.0.7499.109 for Linux. To ensure the latest updates are installed, users can[詳細]>[ヘルプ]>[Google Chrome について]Move to[再起動]Select.
Users of other Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi are also encouraged to apply fixes when they become available.
Source link
