CVE-2025-2783
Google Chromium Mojo Sandbox Escape Vulnerability - [Actively Exploited]
Description
Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)
INFO
Published Date :
March 26, 2025, 4:15 p.m.
Last Modified :
Oct. 24, 2025, 2:06 p.m.
Remotely Exploit :
Yes !
Source :
[email protected]
CISA KEV (Known Exploited Vulnerabilities)
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.
Google Chromium Mojo on Windows contains a sandbox escape vulnerability caused by a logic error, which results from an incorrect handle being provided in unspecified circumstances. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_25.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-2783
Affected Products
                                            The following products are affected by CVE-2025-2783
                                            vulnerability.
                                            Even if cvefeed.io is aware of the exact versions of the
                                            products
                                            that
                                            are
                                            affected, the information is not represented in the table below.
                                        
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source | 
|---|---|---|---|---|---|---|
| CVSS 3.1 | HIGH | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 
Solution
- Update Google Chrome to version 134.0.6998.177 or later.
- Ensure the operating system is up to date.
Public PoC/Exploit Available at Github
                                            CVE-2025-2783 has a 8 public
                                            PoC/Exploit available at Github.
                                            Go to the Public Exploits tab to see the list.
                                        
References to Advisories, Solutions, and Tools
                                            Here, you will find a curated list of external links that provide in-depth
                                            information, practical solutions, and valuable tools related to
                                            CVE-2025-2783.
                                        
| URL | Resource | 
|---|---|
| https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_25.html | Release Notes | 
| https://issues.chromium.org/issues/405143032 | Permissions Required | 
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-2783 | US Government Resource | 
CWE - Common Weakness Enumeration
            While CVE identifies
            specific instances of vulnerabilities, CWE categorizes the common flaws or
            weaknesses that can lead to vulnerabilities. CVE-2025-2783 is
            associated with the following CWEs:
        
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
            (CAPEC)
            stores attack patterns, which are descriptions of the common attributes and
            approaches employed by adversaries to exploit the CVE-2025-2783
            weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
None
This project is a research-oriented and educational simulation designed to demonstrate the concept of a sandbox escape vulnerability within Google Chrome (version 134.0.6998.177), leveraging improper handle , validation via Mojo IPC.
C
Advanced AI-Powered Exploitation Framework | CVE-2025-4664 & CVE-2025-2783 & CVE-2025-2857 & CVE-2025-30397 |
Python Shell
Simulated PoC for CVE-2025-2783 — a sandbox escape vulnerability in Chrome's Mojo IPC. Includes phishing delivery, memory fuzzing, IPC simulation, and logging. Safe for red team demos, detection engineering, and educational use.
Python
None
None
HTML Python Shell
CISA Bot is a GitHub bot that automatically monitors the Cybersecurity and Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog. When new vulnerabilities are published in the KEV, the bot creates GitHub issues in this repository with detailed information about each vulnerability.
Python
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
security cve exploit poc vulnerability
Results are limited to the first 15 repositories due to potential performance issues.
			The following list is the news that have been mention
			CVE-2025-2783 vulnerability anywhere in the article.
		
 
									- 
                                                            
                                                                TheCyberThrone 
Google Chrome Zero-Day Delivers Memento Spyware
October 28, 2025A zero-day vulnerability in Google Chrome, CVE-2025-2783, was actively exploited in early 2025 by attackers using spyware linked to Memento Labs (formerly Hacking Team), a notorious It ... Read more
 
									- 
                                                            
                                                                Help Net Security 
Italian-made spyware Dante linked to Chrome zero-day exploitation campaign
CVE-2025-2783, a Chrome zero-day vulnerability that was detected being exploited in March 2025 and was subsequently fixed by Google, was used by unknown attackers to deliver LeetAgent, suspected comme ... Read more
 
									- 
                                                            
                                                                The Hacker News 
Chrome Zero-Day Exploited to Deliver Italian Memento Labs' LeetAgent Spyware
The zero-day exploitation of a now-patched security flaw in Google Chrome led to the distribution of an espionage-related tool from Italian information technology and services provider Memento Labs, a ... Read more
 
									- 
                                                            
                                                                Daily CyberSecurity 
Kaspersky Exposes Chrome Zero-Day RCE (CVE-2025-2783) Delivering Memento Labs Spyware in ForumTroll Campaign
Researchers at Kaspersky uncovered a sophisticated espionage campaign exploiting a zero-day vulnerability in Google Chrome and delivering commercial spyware linked to the Italian company Memento Labs ... Read more
 
									- 
                                                            
                                                                BleepingComputer 
Italian spyware vendor linked to Chrome zero-day attacks
A zero-day vulnerability in Google Chrome, exploited in Operation ForumTroll earlier this year, delivered malware linked to Italian spyware vendor Memento Labs, born after IntheCyber Group acquired ... Read more
 
									- 
                                                            
                                                                CybersecurityNews 
Chrome 0-Day Vulnerability Actively Exploited in Attacks by Notorious Hacker Group
The notorious Mem3nt0 mori hacker group has been actively exploiting a zero-day vulnerability in Google Chrome, compromising high-profile targets across Russia and Belarus. Dubbed CVE-2025-2783, this ... Read more
 
									- 
                                                            
                                                                security.nl 
Google Chrome-gebruikers via link in phishingmail geïnfecteerd met spyware
Gebruikers van Google Chrome zijn eerder dit jaar het doelwit van een aanval geworden waarbij alleen het klikken op een malafide link in een phishingmail voldoende was om met spyware geïnfecteerd te r ... Read more
 
									- 
                                                            
                                                                Kaspersky 
Mem3nt0 mori – The Hacking Team is back!
In March 2025, Kaspersky detected a wave of infections that occurred when users clicked on personalized phishing links sent via email. No further action was required to initiate the infection; simply ... Read more
 
									- 
                                                            
                                                                TheCyberThrone 
TheCyberThrone CyberSecurity Newsletter Top 5 Articles – July 2025
August 4, 2025Welcome to TheCyberThrone cybersecurity month in review will be posted covering the important security happenings . This review is for the month ending July 2025Subscribers favorite #1Ni ... Read more
 
									- 
                                                            
                                                                TheCyberThrone 
CVE-2025-6558 – Chrome Zero-Day Sandbox Escape via GPU Rendering Flaw
Skip to content July 17, 2025Threat OverviewCVE-2025-6558 is a high-risk zero-day vulnerability (CVSS score: 8.8) impacting Google Chrome’s graphics rendering pipeline, specifically within the ANGLE ( ... Read more
 
									- 
                                                            
                                                                BleepingComputer 
Google fixes actively exploited sandbox escape zero day in Chrome
Google has released a security update for Chrome to address half a dozen vulnerabilities, one of them actively exploited by attackers to escape the browser's sandbox protection. The vulnerability is i ... Read more
 
									- 
                                                            
                                                                The Hacker News 
Urgent: Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild
Jul 16, 2025Ravie LakshmananBrowser Security / Zero-Day Google on Tuesday rolled out fixes for six security issues in its Chrome web browser, including one that it said has been exploited in the wil ... Read more
 
									- 
                                                            
                                                                BleepingComputer 
Google fixes fourth actively exploited Chrome zero-day of 2025
Google has released emergency updates to patch another Chrome zero-day vulnerability exploited in attacks, marking the fourth such flaw fixed since the start of the year. "Google is aware that an expl ... Read more
 
									- 
                                                            
                                                                The Hacker News 
Google Patches Critical Zero-Day Flaw in Chrome’s V8 Engine After Active Exploitation
Vulnerability / Browser Security Google has released security updates to address a vulnerability in its Chrome browser for which an exploit exists in the wild. The zero-day vulnerability, tracked as C ... Read more
 
									- 
                                                            
                                                                The Hacker News 
Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks
Cybercrime / Vulnerability The threat actor known as Blind Eagle has been attributed with high confidence to the use of the Russian bulletproof hosting service Proton66. Trustwave SpiderLabs, in a rep ... Read more
 
									- 
                                                            
                                                                The Hacker News 
Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign
Threat Hunting / Vulnerability Threat hunters have discovered a network of more than 1,000 compromised small office and home office (SOHO) devices that have been used to facilitate a prolonged cyber e ... Read more
 
									- 
                                                            
                                                                The Hacker News 
MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted
Network Security / Vulnerability Threat intelligence firm GreyNoise is warning of a "notable surge" in scanning activity targeting Progress MOVEit Transfer systems starting May 27, 2025—suggesting tha ... Read more
 
									- 
                                                            
                                                                The Hacker News 
Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access
Vulnerability, Network Security Cisco has released updates to address two maximum-severity security flaws in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that could perm ... Read more
 
									- 
                                                            
                                                                The Hacker News 
CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet
Vulnerability / Firmware Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added three security flaws, each impacting AMI MegaRAC, D-Link DIR-859 router, and Forti ... Read more
 
									- 
                                                            
                                                                The Hacker News 
Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC
Vulnerability / Network Security Citrix has released security updates to address a critical flaw affecting NetScaler ADC that it said has been exploited in the wild. The vulnerability, tracked as CVE- ... Read more
                The following table lists the changes that have been made to the
                CVE-2025-2783 vulnerability over time.
            
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
- 
                            Modified Analysis by [email protected]Oct. 24, 2025 Action Type Old Value New Value Added Reference Type CISA-ADP: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-2783 Types: US Government Resource 
- 
                            CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0Oct. 21, 2025 Action Type Old Value New Value Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-2783 
- 
                            CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0Oct. 21, 2025 Action Type Old Value New Value Removed Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-2783 
- 
                            CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0Oct. 21, 2025 Action Type Old Value New Value Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-2783 
- 
                            CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725Mar. 28, 2025 Action Type Old Value New Value Added Date Added 2025-03-27 Added Due Date 2025-04-17 Added Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Added Vulnerability Name Google Chromium Mojo Sandbox Escape Vulnerability 
- 
                            Initial Analysis by [email protected]Mar. 27, 2025 Action Type Old Value New Value Added CWE NVD-CWE-noinfo Added CPE Configuration AND OR *cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* versions up to (excluding) 134.0.6998.177 OR cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* Added Reference Type Chrome: https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_25.html Types: Release Notes Added Reference Type Chrome: https://issues.chromium.org/issues/405143032 Types: Permissions Required 
- 
                            CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0Mar. 26, 2025 Action Type Old Value New Value Added CVSS V3.1 AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H 
- 
                            New CVE Received by [email protected]Mar. 26, 2025 Action Type Old Value New Value Added Description Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High) Added Reference https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_25.html Added Reference https://issues.chromium.org/issues/405143032 
 
                         
                         
                         
                                             
                                            