CVE-2025-11213
📋 TL;DR
This vulnerability allows attackers to spoof website domains in Chrome's address bar on Android devices by tricking users into performing specific UI gestures on a malicious webpage. It affects users of Google Chrome on Android who haven't updated to the patched version. The spoofing could make phishing attacks appear more legitimate.
💻 Affected Systems
- Google Chrome
📦 What is this software?
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →⚠️ Risk & Real-World Impact
Worst Case
Users could be tricked into entering sensitive credentials or financial information on spoofed websites that appear legitimate in the address bar, leading to account compromise or financial fraud.
Likely Case
Phishing attacks become more convincing as attackers can make malicious sites appear to be legitimate domains in the browser's address bar, increasing successful credential harvesting.
If Mitigated
With proper user education about phishing risks and updated browsers, impact is limited to temporary confusion about website authenticity.
🎯 Exploit Status
Requires user interaction (specific UI gestures) on a crafted HTML page; no authentication needed to initiate attack.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 141.0.7390.54
Vendor Advisory: https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_30.html
Restart Required: Yes
Instructions:
1. Open Google Chrome on Android. 2. Go to Settings > About Chrome. 3. Chrome will automatically check for and install updates. 4. Restart Chrome when prompted.
🔧 Temporary Workarounds
Disable JavaScript
androidPrevents the crafted HTML page from executing the malicious code that triggers the vulnerability.
chrome://settings/content/javascript > Toggle off
Use Alternative Browser
androidSwitch to a different browser until Chrome is updated.
🧯 If You Can't Patch
- Educate users to avoid clicking suspicious links or performing unusual gestures on unfamiliar websites.
- Implement network filtering to block known malicious domains that might host exploit pages.
🔍 How to Verify
Check if Vulnerable:
Check Chrome version in Settings > About Chrome; if version is below 141.0.7390.54, the device is vulnerable.
Check Version:
Not applicable for Android GUI; use Settings > About Chrome.
Verify Fix Applied:
Confirm Chrome version is 141.0.7390.54 or higher in Settings > About Chrome.
📡 Detection & Monitoring
Log Indicators:
- Unusual user reports of website address bar inconsistencies or suspected phishing
Network Indicators:
- Increased traffic to domains with similar names to legitimate sites (typosquatting)
SIEM Query:
Not typically applicable for client-side browser vulnerabilities on mobile devices.