Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Can President Trump legally accept $400 million planes for free? | Donald Trump News

Nexpace launches Maplestory N and NXPC tokens to create new chapters in the Maplestory universe

The EU is investing 7.3 billion euros in the 2025 Horizon Europe Work programme

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » New Chrome vulnerability enables cross-origin data leaks via loader referrer policy
Identity

New Chrome vulnerability enables cross-origin data leaks via loader referrer policy

userBy userMay 15, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 15, 2025Ravi LakshmananBrowser Security / Web Security

New Chrome Vulnerabilities

On Wednesday, Google released an update to address four security issues in the Chrome web browser.

High-strength vulnerabilities tracked as CVE-2025-4664 (CVSS score: 4.3) are characterized as inadequate policy enforcement in a component called loaders.

“Policy enforcement in Google Chrome loaders prior to 136.0.7103.113 allowed remote attackers to leak cross-origin data via created HTML pages,” according to the flaw description.

The Tech giant detailed the defects in X on May 5, 2025 to security researcher Vsevolod Kokorin (@slonser_), adding that “the CVE-2025-4664 exploit exists in the wild.”

Cybersecurity

“Unlike other browsers, Chrome resolves link headers for subresource requests,” Kokorin said in a series of posts about X earlier this month. “The problem is that the link header can set the referrer politics. You can specify an insecure URL and capture the full query parameters.”

The researchers added that the query parameters may contain sensitive data that could lead to a full acquisition of the account, allowing query parameter information to be stolen via images from third-party resources.

It is not clear whether the vulnerability was exploited in a malicious context other than this proof of concept (POC) demonstration. CVE-2025-4664 is the second vulnerability after CVE-2025-2783 undergoes “active exploitation” in the wild.

To protect against potential threats, we recommend updating your Chrome browser to version 136.0.7103.113/.114 for Windows and Mac and 136.0.7103.113 for Linux. It is also recommended that users of other Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi also apply the fix when it becomes available.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHarvard thought there would be a cheap copy of Magna Carta. It turns out to be extremely rare
Next Article Russia-Ukraine War: List of Major Events, Day 1,176 | News of the Russian-Ukraine War
user
  • Website

Related Posts

Compliance-only pen test? It’s time to change your approach

May 15, 2025

5 BCDR Essentials for Effective Ransom Defense

May 15, 2025

Russia-linked APT28 misused MDAEMON Zero Day to hack government webmail servers

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Can President Trump legally accept $400 million planes for free? | Donald Trump News

Nexpace launches Maplestory N and NXPC tokens to create new chapters in the Maplestory universe

The EU is investing 7.3 billion euros in the 2025 Horizon Europe Work programme

Coinbase Hacking: Data from thousands exposed in the $20 million tor scheme. The company fights back with a $20 million bounty

Trending Posts

Can President Trump legally accept $400 million planes for free? | Donald Trump News

May 15, 2025

“One Long Nakba”: Palestinians celebrate 77 years since Israel’s mass expulsion | Israeli-Palestinian conflict news

May 15, 2025

New Zealand discusses suspension of protesters from Maori lawmakers | Indigenous Rights News

May 15, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Nexpace launches Maplestory N and NXPC tokens to create new chapters in the Maplestory universe

Coinbase Hacking: Data from thousands exposed in the $20 million tor scheme. The company fights back with a $20 million bounty

Digital Transformation of Fitness: How AI and TwinH are Revolutionizing Physical Exercise

sportsbet.io releases 1 million USDT gifts to mark the Champions League finale

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.