Cyber Security News

Chrome V8 JavaScript Engine Vulnerability Let Attackers Execute Remote Code

Google has swiftly addressed a high-severity flaw in its Chrome browser’s V8 JavaScript engine, releasing an emergency update to thwart potential remote code execution attacks.

The vulnerability, tracked as CVE-2025-12036, stems from an inappropriate implementation within V8, the open-source JavaScript and WebAssembly engine powering Chrome’s rendering capabilities.

Discovered and reported internally by Google’s AI-driven security tool, Big Sleep, on October 15, 2025, the issue could allow malicious websites to execute arbitrary code on users’ devices without any interaction beyond visiting a compromised page.

This patch arrives just days after the discovery, underscoring Google’s commitment to rapid response in browser security. The Stable channel update rolls out to version 141.0.7390.122/.123 for Windows and macOS users, and 141.0.7390.122 for Linux.

Over the coming days and weeks, billions of Chrome users worldwide will receive this fix automatically, minimizing exposure. A detailed changelog highlights the security enhancements, though full bug details remain restricted until most users update to prevent exploitation.

Chrome V8 JavaScript Engine Vulnerability

At its core, V8 processes JavaScript code efficiently to enable dynamic web experiences, from interactive maps to online banking interfaces. However, the flaw in CVE-2025-12036 exploits a mishandled implementation that bypasses Chrome’s sandbox protections.

Attackers could craft malicious scripts to read sensitive memory or inject code, potentially leading to data theft, malware installation, or full system compromise. Rated “High” severity, it aligns with past V8 vulnerabilities that have been weaponized in drive-by downloads and phishing campaigns.

Security experts note this isn’t an isolated incident; V8 has been a frequent target due to its central role in web browsing.

Google’s proactive detection via Big Sleep, a machine learning system scanning for anomalies, prevented the bug from reaching stable releases. The company also credits tools like AddressSanitizer and libFuzzer for ongoing fuzzing efforts that catch such issues early.

This update reinforces the importance of timely patching in an era of escalating browser-based threats. With Chrome holding over 65% market share, vulnerabilities here ripple across the internet ecosystem.

Users are urged to enable automatic updates and avoid suspicious sites. Google thanks external researchers for their contributions, emphasizing collaborative defenses against evolving attacks.

As cyber threats grow more sophisticated, incidents like this highlight the need for AI-assisted vigilance in software development.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned organizations worldwide about active exploitation…

34 minutes ago

New Malware Attack Using Variable Functions and Cookies to Evade and Hide Their Malicious Scripts

A sophisticated malware campaign targeting WordPress sites has emerged, utilizing PHP variable functions and cookie-based…

2 hours ago

Threat Actors Tricks Target Users Via Impersonation and Fictional Financial Aid Offers

An international ecosystem of sophisticated scam operations has emerged, targeting vulnerable populations through impersonation tactics…

4 hours ago

TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT

TransparentTribe, a Pakistani-nexus intrusion set active since at least 2013, has intensified its cyber espionage…

6 hours ago

Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks

As the festive season approaches, organizations are witnessing a disturbing increase in targeted attacks on…

8 hours ago

Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave

The cybersecurity landscape experienced a significant shift in July 2025 when threat actors associated with…

9 hours ago