CVE-2025-0446

4.3 MEDIUM

📋 TL;DR

This vulnerability allows malicious Chrome extensions to spoof user interface elements through specific UI gestures. Users who install crafted extensions and perform certain gestures are affected. The attack requires user interaction and extension installation.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: Versions prior to 132.0.6834.83
Operating Systems: Windows, macOS, Linux, ChromeOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user to install a malicious extension and perform specific UI gestures. Mobile versions may also be affected but not explicitly stated.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could trick users into revealing sensitive information or performing unintended actions by displaying fake login prompts, payment screens, or other deceptive interfaces.

🟠

Likely Case

Phishing attacks where users are tricked into entering credentials into fake dialog boxes that appear legitimate.

🟢

If Mitigated

Limited impact if users only install trusted extensions from official sources and are cautious about unusual UI behavior.

🌐 Internet-Facing: LOW
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires convincing users to install a malicious extension and perform specific gestures. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 132.0.6834.83 and later

Vendor Advisory: https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html

Restart Required: Yes

Instructions:

1. Open Chrome menu > Help > About Google Chrome. 2. Chrome will automatically check for updates. 3. If update is available, click 'Relaunch' to apply. 4. For enterprise deployments, use Chrome Enterprise policies to deploy version 132.0.6834.83 or later.

🔧 Temporary Workarounds

Disable extension installation

all

Prevent users from installing new extensions to block malicious ones

For enterprise: Configure Chrome policy 'ExtensionInstallBlocklist' to '*'

Review installed extensions

all

Audit and remove suspicious or unnecessary extensions

chrome://extensions/

🧯 If You Can't Patch

  • Implement extension allowlisting to only permit vetted extensions
  • Educate users about extension risks and phishing awareness

🔍 How to Verify

Check if Vulnerable:

Check Chrome version in menu > Help > About Google Chrome. If version is below 132.0.6834.83, system is vulnerable.

Check Version:

On command line: google-chrome --version (Linux) or "C:\Program Files\Google\Chrome\Application\chrome.exe" --version (Windows)

Verify Fix Applied:

Confirm Chrome version is 132.0.6834.83 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual extension installation events
  • User reports of suspicious dialog boxes

Network Indicators:

  • Downloads of extensions from non-Chrome Web Store sources

SIEM Query:

source="chrome_extension_logs" AND event="install" AND extension_id NOT IN (approved_list)

🔗 References

📤 Share & Export