CVE-2025-11212

6.3 MEDIUM

📋 TL;DR

This vulnerability in Google Chrome allows attackers to spoof website domains through crafted HTML pages when users perform specific UI gestures. It affects Chrome users on Windows systems running versions before 141.0.7390.54. Attackers can trick users into believing they're on legitimate websites when they're actually on malicious ones.

💻 Affected Systems

Products:
  • Google Chrome
Versions: All versions prior to 141.0.7390.54
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Chrome on Windows; other operating systems and browsers are not vulnerable.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Successful phishing attacks leading to credential theft, financial fraud, or malware installation by convincing users they're on legitimate banking or corporate login pages.

🟠

Likely Case

Credential harvesting through convincing phishing pages that appear to be legitimate websites, potentially leading to account compromise.

🟢

If Mitigated

Limited impact if users are trained to verify URLs and use security extensions, though visual deception remains possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (specific UI gestures) but no authentication. The technique is well-documented in the Chromium issue tracker.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 141.0.7390.54 and later

Vendor Advisory: https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_30.html

Restart Required: Yes

Instructions:

1. Open Chrome 2. Click three-dot menu → Help → About Google Chrome 3. Chrome will automatically check for and install updates 4. Click 'Relaunch' when prompted

🔧 Temporary Workarounds

Disable automatic media playback

windows

Prevents automatic media elements that could be used in the attack

chrome://settings/content/media

Use site isolation

windows

Enables Chrome's site isolation feature for additional protection

chrome://flags/#site-isolation-trial-opt-out
Set to 'Disabled'

🧯 If You Can't Patch

  • Use alternative browsers until Chrome can be updated
  • Implement network filtering to block known malicious domains and enforce URL verification

🔍 How to Verify

Check if Vulnerable:

Check Chrome version in Settings → About Chrome. If version is below 141.0.7390.54, system is vulnerable.

Check Version:

chrome://version/

Verify Fix Applied:

Verify Chrome version is 141.0.7390.54 or higher in Settings → About Chrome.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Chrome process behavior
  • Multiple failed authentication attempts from Chrome sessions
  • User reports of suspicious website behavior

Network Indicators:

  • Unusual redirect patterns
  • Requests to domains with visual similarity to legitimate sites
  • Increased traffic to newly registered domains

SIEM Query:

source="chrome" AND (event_description="unusual_redirect" OR event_description="domain_spoofing_attempt")

🔗 References

📤 Share & Export