Google Releases Emergency Chrome Update to Patch Multiple RCE Vulnerabilities

Google has released Chrome version 142 to address five critical security vulnerabilities, three of which carry high-risk severity ratings.

The update became available on November 5, 2025, across desktop platforms and Android devices, with the patch rolling out gradually through Google Play and traditional update channels over the coming days.

Critical Vulnerabilities Fixed

The emergency update resolves a dangerous combination of flaws that security experts warn could allow attackers to execute malicious code directly on user systems.

The most concerning vulnerability, designated CVE-2025-12725, involves an out-of-bounds write error in WebGPU, Chrome’s graphics processing component.

This type of flaw allows attackers to write data outside intended memory boundaries, potentially overwriting critical system information.

An anonymous security researcher discovered this vulnerability on September 9, and Google has kept technical details restricted until most users receive the fix.

Two additional high-severity vulnerabilities affect Chrome’s core processing engine. CVE-2025-12727 targets V8, the JavaScript engine that powers Chrome’s performance, while CVE-2025-12726 impacts Chrome’s Views component, which handles the browser’s user interface.

Both flaws stem from inappropriate implementations that could lead to memory corruption and unauthorized code execution.

Researcher Alesandro Ortiz reported the Views vulnerability on September 25, and the V8 flaw was identified by security researcher 303f06e3 on October 23.

Beyond the critical fixes, Google patched two medium-severity issues affecting Chrome’s Omnibox—the address bar search feature.

CVE-2025-12728, reported by researcher Hafiizh, and CVE-2025-12729, identified by Khalil Zhani, both involve inappropriate implementation in this component.

CVE IDSeverityComponentVulnerability TypeCVSS 3.1Affected VersionsResearcher
CVE-2025-12725HighWebGPUOut of bounds write8.8Chrome 142.0.7444.134/135, Android 142.0.7444.138Anonymous
CVE-2025-12726HighViewsInappropriate implementation8.8Chrome 142.0.7444.134/135, Android 142.0.7444.138Alesandro Ortiz
CVE-2025-12727HighV8Inappropriate implementation8.8Chrome 142.0.7444.134/135, Android 142.0.7444.138303f06e3
CVE-2025-12728MediumOmniboxInappropriate implementation6.5Chrome 142.0.7444.134/135, Android 142.0.7444.138Hafiizh
CVE-2025-12729MediumOmniboxInappropriate implementation6.5Chrome 142.0.7444.134/135, Android 142.0.7444.138Khalil Zhani

While less immediately dangerous than their high-severity counterparts, these vulnerabilities still warrant swift updating.

Users across all platforms should prioritize updating Chrome as soon as possible.

Desktop users running Windows, Mac, and Linux should receive version 142.0.7444.134 or later, while Android users will see version 142.0.7444.138 rolling out gradually.

The release notes explicitly state that Android versions contain the identical security fixes as desktop releases.

Google noted that detailed information about these vulnerabilities will remain restricted until a significant majority of users have installed the patch, preventing attackers from developing targeted exploits.

The company credited multiple security researchers who discovered these flaws before malicious actors could weaponize them.

Users are advised to enable automatic updates in Chrome settings to ensure they receive security patches promptly.

For those experiencing update delays, manually checking for updates through Chrome’s settings menu can accelerate the process.

This emergency patch exemplifies the ongoing cat-and-mouse game between browser developers and security threats in an increasingly hostile digital landscape.

Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here