CVE-2025-11209

8.2 HIGH

📋 TL;DR

This vulnerability allows attackers to spoof the URL bar (Omnibox) in Google Chrome on Android, making malicious websites appear legitimate. Users of Google Chrome on Android are affected when visiting crafted HTML pages. The spoofing could trick users into believing they're on a trusted site.

💻 Affected Systems

Products:
  • Google Chrome for Android
Versions: All versions prior to 141.0.7390.54
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Chrome on Android, not desktop versions. Requires user interaction (visiting malicious page).

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be tricked into entering sensitive information (passwords, credit cards) on phishing sites that appear to be legitimate banking or login pages.

🟠

Likely Case

Users might be redirected to phishing sites that appear legitimate, leading to credential theft or malware installation.

🟢

If Mitigated

With proper user awareness training and multi-factor authentication, the impact is reduced to minor inconvenience or failed phishing attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user to visit a crafted HTML page. No authentication needed for the attack itself.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 141.0.7390.54

Vendor Advisory: https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_30.html

Restart Required: Yes

Instructions:

1. Open Google Play Store 2. Search for 'Chrome' 3. Tap 'Update' if available 4. Restart Chrome after update

🔧 Temporary Workarounds

Use alternative browser

android

Temporarily use a different browser until Chrome is updated

Disable JavaScript

android

Disable JavaScript in Chrome settings to prevent exploitation

🧯 If You Can't Patch

  • Educate users to manually verify URLs before entering credentials
  • Implement web filtering to block known malicious sites

🔍 How to Verify

Check if Vulnerable:

Open Chrome on Android, go to Settings > About Chrome, check if version is below 141.0.7390.54

Check Version:

chrome://version/ in Chrome address bar

Verify Fix Applied:

Confirm Chrome version is 141.0.7390.54 or higher in Settings > About Chrome

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL patterns in browser logs
  • Multiple failed login attempts from same IP

Network Indicators:

  • Traffic to domains with suspicious certificate mismatches
  • Redirects to URLs with unusual character encoding

SIEM Query:

source="chrome_logs" AND (url_contains="%00" OR url_contains("@") OR url_length>200)

🔗 References

📤 Share & Export