Known Exploited Vulnerability
8.3
HIGH CVSS 3.1
CVE-2025-2783
Google Chromium Mojo Sandbox Escape Vulnerability - [Actively Exploited]
Description

Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)

INFO

Published Date :

March 26, 2025, 4:15 p.m.

Last Modified :

March 28, 2025, 1 a.m.

Remotely Exploit :

Yes !
CISA Notification
CISA KEV (Known Exploited Vulnerabilities)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.

Description :

Google Chromium Mojo on Windows contains a sandbox escape vulnerability caused by a logic error, which results from an incorrect handle being provided in unspecified circumstances. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Required Action :

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Notes :

https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_25.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-2783

Affected Products

The following products are affected by CVE-2025-2783 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Microsoft windows
2 Microsoft edge_chromium
1 Google chrome
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 HIGH 134c704f-9b21-4f2e-91b3-4a467353bcc0
Solution
Update Google Chrome to patch a sandbox escape vulnerability.
  • Update Google Chrome to version 134.0.6998.177 or later.
  • Ensure the operating system is up to date.
Public PoC/Exploit Available at Github

CVE-2025-2783 has a 8 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2025-2783.

URL Resource
https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_25.html Release Notes
https://issues.chromium.org/issues/405143032 Permissions Required
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-2783 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-2783 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Updated: 1 week, 6 days ago
3 stars 0 fork 0 watcher
Born at : June 22, 2025, 2:21 a.m. This repo has been linked 2 different CVEs too.

This project is a research-oriented and educational simulation designed to demonstrate the concept of a sandbox escape vulnerability within Google Chrome (version 134.0.6998.177), leveraging improper handle , validation via Mojo IPC.

C

Updated: 1 month, 4 weeks ago
3 stars 0 fork 0 watcher
Born at : June 15, 2025, 11:30 p.m. This repo has been linked 1 different CVEs too.

Advanced AI-Powered Exploitation Framework | CVE-2025-4664 & CVE-2025-2783 & CVE-2025-2857 & CVE-2025-30397 |

Python Shell

Updated: 2 months ago
8 stars 2 fork 2 watcher
Born at : May 26, 2025, 12:51 p.m. This repo has been linked 6 different CVEs too.

Simulated PoC for CVE-2025-2783 — a sandbox escape vulnerability in Chrome's Mojo IPC. Includes phishing delivery, memory fuzzing, IPC simulation, and logging. Safe for red team demos, detection engineering, and educational use.

Python

Updated: 1 month, 1 week ago
23 stars 2 fork 2 watcher
Born at : April 6, 2025, 3:49 a.m. This repo has been linked 1 different CVEs too.

None

Updated: 4 months, 2 weeks ago
11 stars 0 fork 0 watcher
Born at : March 28, 2025, 8:33 p.m. This repo has been linked 1 different CVEs too.

None

HTML Python Shell

Updated: 1 month, 3 weeks ago
0 stars 0 fork 0 watcher
Born at : Feb. 13, 2025, 8:50 a.m. This repo has been linked 891 different CVEs too.

CISA Bot is a GitHub bot that automatically monitors the Cybersecurity and Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog. When new vulnerabilities are published in the KEV, the bot creates GitHub issues in this repository with detailed information about each vulnerability.

Python

Updated: 2 days, 17 hours ago
2 stars 1 fork 1 watcher
Born at : Oct. 29, 2024, 10:19 a.m. This repo has been linked 205 different CVEs too.

📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.

security cve exploit poc vulnerability

Updated: 23 hours, 50 minutes ago
7229 stars 1202 fork 1202 watcher
Born at : Dec. 8, 2019, 1:03 p.m. This repo has been linked 802 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-2783 vulnerability anywhere in the article.

  • TheCyberThrone
TheCyberThrone CyberSecurity Newsletter Top 5 Articles – July 2025

August 4, 2025Welcome to TheCyberThrone cybersecurity month in review will be posted covering the important security happenings . This review is for the month ending July 2025Subscribers favorite #1Ni ... Read more

Published Date: Aug 04, 2025 (3 weeks, 4 days ago)
  • TheCyberThrone
CVE-2025-6558 – Chrome Zero-Day Sandbox Escape via GPU Rendering Flaw

Skip to content July 17, 2025Threat OverviewCVE-2025-6558 is a high-risk zero-day vulnerability (CVSS score: 8.8) impacting Google Chrome’s graphics rendering pipeline, specifically within the ANGLE ( ... Read more

Published Date: Jul 17, 2025 (1 month, 1 week ago)
  • BleepingComputer
Google fixes actively exploited sandbox escape zero day in Chrome

Google has released a security update for Chrome to address half a dozen vulnerabilities, one of them actively exploited by attackers to escape the browser's sandbox protection. The vulnerability is i ... Read more

Published Date: Jul 16, 2025 (1 month, 1 week ago)
  • The Hacker News
Urgent: Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild

Jul 16, 2025Ravie LakshmananBrowser Security / Zero-Day Google on Tuesday rolled out fixes for six security issues in its Chrome web browser, including one that it said has been exploited in the wil ... Read more

Published Date: Jul 16, 2025 (1 month, 1 week ago)
  • BleepingComputer
Google fixes fourth actively exploited Chrome zero-day of 2025

Google has released emergency updates to patch another Chrome zero-day vulnerability exploited in attacks, marking the fourth such flaw fixed since the start of the year. "Google is aware that an expl ... Read more

Published Date: Jul 01, 2025 (1 month, 4 weeks ago)
  • The Hacker News
Google Patches Critical Zero-Day Flaw in Chrome’s V8 Engine After Active Exploitation

Vulnerability / Browser Security Google has released security updates to address a vulnerability in its Chrome browser for which an exploit exists in the wild. The zero-day vulnerability, tracked as C ... Read more

Published Date: Jul 01, 2025 (1 month, 4 weeks ago)
  • The Hacker News
Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks

Cybercrime / Vulnerability The threat actor known as Blind Eagle has been attributed with high confidence to the use of the Russian bulletproof hosting service Proton66. Trustwave SpiderLabs, in a rep ... Read more

Published Date: Jun 30, 2025 (1 month, 4 weeks ago)
  • The Hacker News
Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign

Threat Hunting / Vulnerability Threat hunters have discovered a network of more than 1,000 compromised small office and home office (SOHO) devices that have been used to facilitate a prolonged cyber e ... Read more

Published Date: Jun 27, 2025 (2 months ago)
  • The Hacker News
MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted

Network Security / Vulnerability Threat intelligence firm GreyNoise is warning of a "notable surge" in scanning activity targeting Progress MOVEit Transfer systems starting May 27, 2025—suggesting tha ... Read more

Published Date: Jun 27, 2025 (2 months ago)
  • The Hacker News
Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access

Vulnerability, Network Security Cisco has released updates to address two maximum-severity security flaws in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that could perm ... Read more

Published Date: Jun 26, 2025 (2 months ago)
  • The Hacker News
CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet

Vulnerability / Firmware Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added three security flaws, each impacting AMI MegaRAC, D-Link DIR-859 router, and Forti ... Read more

Published Date: Jun 26, 2025 (2 months ago)
  • The Hacker News
Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC

Vulnerability / Network Security Citrix has released security updates to address a critical flaw affecting NetScaler ADC that it said has been exploited in the wild. The vulnerability, tracked as CVE- ... Read more

Published Date: Jun 25, 2025 (2 months ago)
  • The Hacker News
Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure

Data Privacy / Vulnerability Cybersecurity researchers have detailed two now-patched security flaws in SAP Graphical User Interface (GUI) for Windows and Java that, if successfully exploited, could ha ... Read more

Published Date: Jun 25, 2025 (2 months ago)
  • The Hacker News
Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers

Unidentified threat actors have been observed targeting publicly exposed Microsoft Exchange servers to inject malicious code into the login pages that harvest their credentials. Positive Technologies, ... Read more

Published Date: Jun 24, 2025 (2 months ago)
  • The Hacker News
APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine

Malware / Threat Intelligence The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new cyber attack campaign by the Russia-linked APT28 (aka UAC-0001) threat actors using Signal c ... Read more

Published Date: Jun 24, 2025 (2 months ago)
  • The Hacker News
China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom

Cyber Espionage / Chinese Hackers The Canadian Centre for Cyber Security and the U.S. Federal Bureau of Investigation (FBI) have issued an advisory warning of cyber attacks mounted by the China-linked ... Read more

Published Date: Jun 24, 2025 (2 months ago)
  • TheCyberThrone
CVE-2025-49763 — Apache Traffic Server ESI Memory Exhaustion Flaw

CVE-2025-49763 is a denial-of-service (DoS) vulnerability found in Apache Traffic Server (ATS), specifically within its Edge Side Includes (ESI) plugin. The flaw stems from insufficient restrictions o ... Read more

Published Date: Jun 19, 2025 (2 months, 1 week ago)
  • TheCyberThrone
CVE-2025-23121 Remote Code Execution in Veeam

📌 OverviewCVE-2025-23121 is a critical remote code execution (RCE) vulnerability identified in Veeam Backup & Replication (VBR) software. The flaw affects domain-joined backup servers and allows any a ... Read more

Published Date: Jun 19, 2025 (2 months, 1 week ago)
  • TheCyberThrone
Trinper Backdoor Exploiting Chrome Zero-Day CVE-2025-2783

A critical vulnerability in Google Chrome, tracked as CVE-2025-2783, has been exploited in cyberattacks deploying the Trinper backdoor. The flaw, a sandbox escape vulnerability, enables attackers to e ... Read more

Published Date: Jun 18, 2025 (2 months, 1 week ago)
  • The Hacker News
Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor

Malware / Cyber Espionage A now-patched security flaw in Google Chrome was exploited as a zero-day by a threat actor known as TaxOff to deploy a backdoor codenamed Trinper. The attack, observed in mid ... Read more

Published Date: Jun 17, 2025 (2 months, 1 week ago)

The following table lists the changes that have been made to the CVE-2025-2783 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725

    Mar. 28, 2025

    Action Type Old Value New Value
    Added Date Added 2025-03-27
    Added Due Date 2025-04-17
    Added Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
    Added Vulnerability Name Google Chromium Mojo Sandbox Escape Vulnerability
  • Initial Analysis by [email protected]

    Mar. 27, 2025

    Action Type Old Value New Value
    Added CWE NVD-CWE-noinfo
    Added CPE Configuration AND OR *cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* versions up to (excluding) 134.0.6998.177 OR cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
    Added Reference Type Chrome: https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_25.html Types: Release Notes
    Added Reference Type Chrome: https://issues.chromium.org/issues/405143032 Types: Permissions Required
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Mar. 26, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
  • New CVE Received by [email protected]

    Mar. 26, 2025

    Action Type Old Value New Value
    Added Description Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)
    Added Reference https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_25.html
    Added Reference https://issues.chromium.org/issues/405143032
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 8.3
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact